WO2023217026A1 - Service processing method, and device and readable storage medium - Google Patents

Service processing method, and device and readable storage medium Download PDF

Info

Publication number
WO2023217026A1
WO2023217026A1 PCT/CN2023/092471 CN2023092471W WO2023217026A1 WO 2023217026 A1 WO2023217026 A1 WO 2023217026A1 CN 2023092471 W CN2023092471 W CN 2023092471W WO 2023217026 A1 WO2023217026 A1 WO 2023217026A1
Authority
WO
WIPO (PCT)
Prior art keywords
information
network device
model
request message
target
Prior art date
Application number
PCT/CN2023/092471
Other languages
French (fr)
Chinese (zh)
Inventor
王慧
康艳超
于航
Original Assignee
维沃移动通信有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 维沃移动通信有限公司 filed Critical 维沃移动通信有限公司
Publication of WO2023217026A1 publication Critical patent/WO2023217026A1/en

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F18/00Pattern recognition
    • G06F18/20Analysing
    • G06F18/21Design or setup of recognition systems or techniques; Extraction of features in feature space; Blind source separation
    • G06F18/214Generating training patterns; Bootstrap methods, e.g. bagging or boosting
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F18/00Pattern recognition
    • G06F18/20Analysing
    • G06F18/24Classification techniques
    • G06F18/243Classification techniques relating to the number of classes
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06NCOMPUTING ARRANGEMENTS BASED ON SPECIFIC COMPUTATIONAL MODELS
    • G06N3/00Computing arrangements based on biological models
    • G06N3/02Neural networks
    • G06N3/08Learning methods
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/14Network analysis or design
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/02Protecting privacy or anonymity, e.g. protecting personally identifiable information [PII]

Definitions

  • This application belongs to the field of communication technology, and specifically relates to a business processing method, equipment and readable storage medium.
  • 5G drives the Internet of Everything, and all kinds of data have exploded.
  • 3GPP 3rd Generation Partnership Project
  • 3GPP 3rd Generation Partnership Project
  • a large amount of information circulates, and data privacy within the network cannot be protected.
  • Embodiments of the present application provide a business processing method, equipment, and a readable storage medium, which can solve the problem that the privacy of data within the network cannot be protected when providing internal network data to third-party applications.
  • the first aspect provides a business processing method, including:
  • the first network device receives a first request message sent by the second network device, where the first request message is used to request privacy protection for the target service;
  • the first network device determines model training related information according to the first request message
  • the first network device obtains sample data
  • the first network device performs model training based on the sample data and the model training related information to obtain a target model, and the target model is used to protect the privacy of the data required by the target business;
  • the first network device sends first information to the second network device, where the first information is used in response to the first request message.
  • the second aspect provides a business processing method, including:
  • the second network device sends a first request message to the first network device, where the first request message is used to request privacy protection for the target service;
  • the second network device receives the first information sent by the first network device, and the first information is used to respond to the first request message.
  • a business processing device including:
  • the first receiving module is configured to receive a first request message sent by the second network device, where the first request message is used to Request privacy protection for the target business;
  • a first determination module configured to determine model training related information according to the first request message
  • a training module configured to perform model training based on the sample data and the model training related information to obtain a target model, where the target model is used to protect the privacy of the data required by the target business;
  • the first sending module is configured to send first information to the second network device, where the first information is used to respond to the first request message.
  • a business processing device including:
  • a second sending module configured to send a first request message to the first network device, where the first request message is used to request privacy protection for the target service;
  • the second receiving module is configured to receive the first information sent by the first network device, where the first information is used to respond to the first request message.
  • a network side device in a fifth aspect, includes a processor and a memory.
  • the memory stores programs or instructions that can be run on the processor.
  • the program or instructions are executed by the processor.
  • a network side device including a processor and a communication interface, wherein the communication interface is used for a first network device to receive a first request message sent by a second network device, and the first request message is used to request privacy protection for the target service; the processor is used for the first network device to determine model training related information according to the first request message; the communication interface is used for the first network device to obtain Sample data; the processor is configured to: the first network device performs model training according to the sample data and the model training related information to obtain a target model, and the target model is used to perform data on the target business requirements. Privacy protection: the communication interface is used for the first network device to send first information to the second network device, and the first information is used to respond to the first request message.
  • a network side device in a seventh aspect, includes a processor and a memory.
  • the memory stores programs or instructions that can be run on the processor.
  • the program or instructions are executed by the processor.
  • a network side device including a processor and a communication interface, wherein the communication interface is used for the second network device to send a first request message to the first network device, and the first request message is In order to request privacy protection for the target service, the second network device receives the first information sent by the first network device, and the first information is used to respond to the first request message.
  • a readable storage medium is provided. Programs or instructions are stored on the readable storage medium. When the programs or instructions are executed by a processor, the steps of the method described in the first aspect are implemented, or the steps of the method are implemented as described in the first aspect. The steps of the method described in the second aspect.
  • a chip in a tenth aspect, includes a processor and a communication interface.
  • the communication interface is coupled to the processor.
  • the processor is used to run programs or instructions to implement the method described in the first aspect. steps, or Implement the steps of the method as described in the second aspect.
  • a computer program/program product is provided, the computer program/program product is stored in a storage medium, and the computer program/program product is executed by at least one processor to implement the first aspect The steps of the method, or the steps of implementing the method as described in the second aspect.
  • the second network device requests the first network device to perform privacy protection on the target service.
  • the first network device performs model training based on the determined model training related information and the obtained sample data, and obtains A target model for privacy processing of data required by target business needs.
  • the network provides internal network data to third-party applications, it can perform privacy processing on the data through the target model, so that the privacy of internal network data is protected.
  • Figure 1 is a block diagram of a wireless communication system provided by an embodiment of the present application.
  • FIG. 2 is one of the flow diagrams of the business processing method provided by the embodiment of the present application.
  • Figure 3 is the second schematic flow chart of the business processing method provided by the embodiment of the present application.
  • Figure 4a is one of the flow diagrams of an implementation example provided by the embodiment of this application.
  • Figure 4b is the second schematic flow diagram of an implementation example provided by the embodiment of the present application.
  • Figure 5 is one of the structural schematic diagrams of the business processing device provided by the embodiment of the present application.
  • Figure 6 is the second structural schematic diagram of the business processing device provided by the embodiment of the present application.
  • Figure 7 is a schematic structural diagram of a communication device provided by an embodiment of the present application.
  • Figure 8 is a schematic structural diagram of a network-side device provided by an embodiment of the present application.
  • first, second, etc. in the description and claims of this application are used to distinguish similar objects and are not used to describe a specific order or sequence. It is to be understood that the terms so used are interchangeable under appropriate circumstances so that the embodiments of the present application can be practiced in sequences other than those illustrated or described herein, and that "first" and “second” are distinguished objects It is usually one type, and the number of objects is not limited.
  • the first object can be one or multiple.
  • “and/or” in the description and claims indicates at least one of the connected objects, and the character “/" generally indicates that the related objects are in an "or” relationship.
  • LTE Long Term Evolution
  • LTE-Advanced, LTE-A Long Term Evolution
  • CDMA Code Division Multiple Access
  • TDMA Time Division Multiple Access
  • FDMA Frequency Division Multiple Access
  • OFDMA Orthogonal Frequency Division Multiple Access
  • SC-FDMA Single-carrier Frequency Division Multiple Access
  • NR New Radio
  • FIG. 1 shows a block diagram of a wireless communication system to which embodiments of the present application are applicable.
  • the wireless communication system includes a terminal 11 and a network side device 12.
  • the terminal 11 may be a mobile phone, a tablet computer (Tablet Personal Computer), a laptop computer (Laptop Computer), or a notebook computer, a personal digital assistant (Personal Digital Assistant, PDA), a palmtop computer, a netbook, or a super mobile personal computer.
  • Tablet Personal Computer Tablet Personal Computer
  • laptop computer laptop computer
  • PDA Personal Digital Assistant
  • PDA Personal Digital Assistant
  • UMPC ultra-mobile personal computer
  • UMPC mobile Internet device
  • MID mobile Internet Device
  • AR augmented reality
  • VR virtual reality
  • robots wearable devices
  • WUE Vehicle User Equipment
  • PUE Pedestrian User Equipment
  • smart home home equipment with wireless communication functions, such as refrigerators, TVs, washing machines or furniture, etc.
  • game consoles personal computers (personal computer, PC), teller machine or self-service machine and other terminal-side devices.
  • Wearable devices include: smart watches, smart bracelets, smart headphones, smart glasses, smart jewelry (smart bracelets, smart bracelets, smart rings, smart necklaces, smart anklets) bracelets, smart anklets, etc.), smart wristbands, smart clothing, etc.
  • the network side device 12 may include an access network device or a core network device, where the access network device may also be called a radio access network device, a radio access network (Radio Access Network, RAN), a radio access network function or a wireless device.
  • Access network equipment may include base stations, Wireless Local Area Network (WLAN) access points, Wireless Fidelity (WiFi) nodes, etc.
  • the base station may be called a Node B, an Evolved Node B (eNB), or an access point.
  • BTS Base Transceiver Station
  • BSS Basic Service Set
  • ESS Extended Service Set
  • TRP Transmitting Receiving Point
  • the base station is not limited to specific technical terms. It should be noted that in this application, in the embodiment, only the base station in the NR system is taken as an example for introduction, and the specific type of the base station is not limited.
  • Core network equipment may include but is not limited to at least one of the following: core network nodes, core network functions, mobility management entities (Mobility Management Entity, MME), access mobility management functions (Access and Mobility Management Function, AMF), session management functions (Session Management Function, SMF), User Plane Function (UPF), Policy Control Function (PCF), Policy and Charging Rules Function (PCRF), Edge Application Service Discovery function (Edge Application Server Discovery Function, EASDF), Unified Data Management (UDM), Unified Data Repository (UDR), Home Subscriber Server (HSS), Centralized network configuration ( Centralized network configuration (CNC), network storage function (Network Repository Function, NRF), network opening function (Network Exposure Function (NEF), local NEF (Local NEF, or L-NEF), binding support function (Binding Support Function, BSF), application function (Application Function, AF), etc.
  • MME mobility management entities
  • AMF Access and Mobility Management Function
  • SMF Session Management Function
  • UPF User Plane Function
  • NEF Network Exposure Function
  • NEF is a network element within 3GPP that interacts with third parties authorized by 3GPP through specific interfaces.
  • the specific capabilities of the 5G network that can be exposed to the outside include:
  • Monitoring capability used to monitor specific events of UE in the 5G system and expose these monitoring event information externally through NEF. Monitoring events mainly include UE location, reachability, roaming status and connection status, etc.;
  • Security reporting capabilities Including identity authentication, authorization control, network defense and other services, or third-party applications manage authorized slices to configure and adjust network security capabilities.
  • the current 3GPP network can only exchange information with third parties through NEF.
  • the information exchanged between 3GPP and third parties is not sufficient, so that a large amount of useful information cannot be effectively circulated, and the value of the data cannot be reflected.
  • a large amount of information is circulated, it is not clear how data privacy within the network can be protected.
  • an embodiment of the present application provides a service processing method.
  • the execution subject of the method is a first network device.
  • the first network device refers to a device that has certain analysis, calculation and artificial intelligence (AI) capabilities within 3GPP.
  • the network element with the training capability can be an existing 3GPP network element or a newly added network element, which is used to protect the privacy of 3GPP internal data.
  • the first network device can be referred to as a network entity for short;
  • Methods include:
  • Step 201 The first network device receives a first request message sent by the second network device.
  • the first request message is used to request privacy protection for a target service.
  • the target service may also be called a privacy protection service;
  • Step 202 The first network device determines model training related information according to the first request message
  • Step 203 The first network device obtains sample data
  • Step 204 The first network device performs model training based on the sample data and model training related information to obtain a target model.
  • the target model is used to protect the privacy of data required by the target business.
  • the target model can also be called a target algorithm, a privacy processing method, Privacy processing algorithms, etc.;
  • Step 205 The first network device sends the first information to the second network device, and the first information is used to respond to the first request message.
  • the above-mentioned second network device is a third-party network element authorized by 3GPP, and may be an application function (Application Function, AF) entity, for example.
  • AF Application Function
  • the second network device requests the first network device to perform privacy protection on the target service.
  • the first network device performs model training based on the determined model training related information and the obtained sample data, and obtains A target model for privacy processing of data required by target business needs.
  • the network provides in-network When collecting external data, the data can be processed privately through the target model to protect the privacy of data within the network.
  • using the methods of the embodiments of this application can allow more types of internal network data to interact with third parties while ensuring privacy and security, thereby enabling 3GPP and third parties to interact with a large amount of data and increase the value of the data.
  • the first network device receiving the first request message sent by the second network device includes: the first network device receiving the first request message sent by the second network device through the third network device;
  • the first network device sending the first information to the second network device includes: the first network device sending the first information to the second network device through the third network device;
  • the target business is an authorized business.
  • the above-mentioned third network device is a 3GPP information exposure network element, which refers to a network element within 3GPP that has the function of information exchange and authorization with a third party. It can be an existing 3GPP network element or a newly added network element, such as a third-party network element. Network devices can be NEF entities.
  • the above target service is an authorized service, which specifically means that when the second network device requests privacy protection for the target service from the first network device, the third network device first determines whether the target service is authorized, that is, the second network device may Unauthorized services will be requested, but can be judged and filtered by the third network device; specifically: the third network device verifies the first request information based on the preconfigured privacy service contract, and determines whether the second network device Authorized to obtain privacy services. If it is determined that the target service is authorized, subsequent operations will be performed.
  • Embodiment 1 The first network device determines parameters related to model training based on the business requirements provided by the second network device, collects sample data within 3GPP and performs model training locally to obtain the target model;
  • the first request message includes one or more of the following:
  • the identification of the second network device which may be AF ID, for example;
  • the identification of the target service that is, the privacy protection service ID
  • the privacy protection service ID is "beam management optimization”, “user location recommendation”, “UE fitness probability estimation” wait;
  • Privacy protection level defined by 3GPP.
  • the intensity of protection and exposed content of each level are different.
  • the definition principle can be that the higher the level, the fewer the original data features are exposed and the higher the processing complexity.
  • the privacy protection level can be related to the basic model and sample features used in model training. For example, the higher the level, the more complex the sample feature extraction method and the greater the number of samples. Correspondingly, the effect of the trained model on privacy protection is The better;
  • Model performance information used to indicate the termination conditions of model training, including convergence conditions, iteration performance or model accuracy evaluation, etc.
  • the first network device determines model training related information according to the first request message, including:
  • the first network device determines model training related information according to the first request message
  • the above-mentioned first preset condition refers to the first network device parsing the first request message to determine model training related information. prerequisites.
  • the first preset condition includes one or more of the following:
  • the target business operates based on privacy data, that is, the data required by the privacy protection business is private data, such as the implementation of privacy data within the terminal or 3GPP;
  • Implementation Mode 2 Based on the model training related parameters provided by the second network device, the first network device collects sample data within 3GPP and performs model training locally to obtain a privacy processing method;
  • the first request message includes one or more of the following:
  • the identification of the second network device which may be AF ID, for example;
  • the identification of the target service that is, the privacy protection service ID
  • the privacy protection service ID is "beam management optimization”, “user location recommendation”, “UE fitness probability estimation” wait;
  • Privacy protection level defined by 3GPP.
  • the intensity of protection and exposed content of each level are different.
  • the definition principle can be that the higher the level, the fewer the original data features are exposed and the higher the processing complexity; specifically, privacy protection
  • the level can be related to the basic model and sample features used in model training. For example, the higher the level, the more complex the sample feature extraction method and the greater the number of samples. Correspondingly, the trained model is better at privacy protection.
  • the relevant information of the target model refers to the relevant description of the privacy processing method, which is used to specify the basic training method adopted for privacy processing;
  • the relevant information of the target model includes one or more of the following:
  • Model training instruction information used to instruct the first network device to perform model training, that is, used to indicate that privacy protection services need to obtain privacy processing methods through model training;
  • Model training configuration information used to limit the model training configuration such as the basic model used.
  • model training configuration information includes one or more of the following:
  • Model type information (or model identification information), such as model ID, etc., is used to indicate the basic model used by the first network device. That is, it is used to instruct network entities what basic model to use for model training, such as using heterogeneous neural networks, decision trees, etc.;
  • Model configuration information is used to instruct the first network device to configure parameters for the basic model used when performing model training, that is, to instruct network entities to use a certain model. More specific parameters are needed for model training to define higher-level concepts for the basic model used, such as defining the complexity and learning capabilities of the basic model.
  • Model configuration information can include, for example, the number of hidden layers for heterogeneous neural networks. , for the tree depth, number of trees, split points, etc. of the decision tree;
  • Model performance information used to indicate the termination conditions of model training, including convergence conditions, iteration performance or model accuracy evaluation, etc.;
  • Sample data requirement information including sample type, sample quantity, sample timeliness, sample range, sample collection method, etc.
  • the first network device determines model training related information according to the first request message, including:
  • the first network device determines model training related information according to the first request message
  • the above-mentioned second preset condition refers to a prerequisite for the first network device to parse the first request message to determine model training related information.
  • the second preset condition includes one or more of the following:
  • the first request message includes model training instruction information
  • the target business operates based on privacy data, that is, the data required by the privacy protection business is private data, such as the implementation of privacy data within the terminal or 3GPP;
  • the associated data of the same UE in different domains that is, the MM related data generated by the same UE in the CN, the location data generated in the RAN, and the business experience data generated by third-party services, are trained using samples with different characteristics. The modeling effect of increased features can be achieved.
  • the model training related information includes one or more of the following:
  • Basic model information used to indicate the basic model used by the first network device when performing model training.
  • the network entity may parse the first request message and analyze the complex steps to complete the task. degree, required data, etc., and then selects a suitable basic model from the model library that can complete the task; corresponding to the second embodiment above, the network entity selects a model from the model library as the model based on the model type information in the first request message.
  • Basic model for training
  • Model configuration information is used to instruct the first network device to configure parameters for the basic model used when performing model training, that is, to instruct the network entity to use a certain model for model training. More specific parameters are needed during training to define higher-level concepts for the basic model used, such as defining the complexity and learning capabilities of the basic model.
  • the model configuration information can include, for example, the number of hidden layers for heterogeneous neural networks, and the number of hidden layers for heterogeneous neural networks. The tree depth, number of trees, split points, etc. of the decision tree;
  • Termination condition information of model training which is used to indicate that model training can be stopped when it reaches a certain level, such as model convergence conditions, model accuracy or the number of iterations of the model, etc.
  • the network entity determines based on the model performance information in the first request message.
  • the first network device obtains sample data, including:
  • the first network device determines the sample data type and sample data source based on the second information
  • the first network device obtains sample data according to the sample data type and sample data source
  • the second information is the sample data request information in the first request message, or the second information is experience information of model training.
  • the second information may also include a privacy protection level.
  • the privacy protection level can be related to the basic model and sample features used in model training. For example, the higher the level, the more complex the sample feature extraction method and the greater the number of samples. Correspondingly, the effect of the trained model on privacy protection is The better.
  • the first network device can determine the sample data type and sample data source according to the experience information of model training and/or the privacy protection level.
  • the sample data source can be a terminal or a network element in the core network.
  • Various network functions Network Functions, NFs)), such as Authentication Management Function (AMF), Session Management Function (SMF), Policy Control Function (PCF), etc.;
  • the first network device can determine the sample data type and sample data source according to the sample data requirement information and/or privacy protection level in the first request message, or the first network device can determine the sample data type and source according to the experience of model training.
  • the level of information and/or privacy protection determines the sample data type and sample data source.
  • UE location terminal location
  • beam angles beam angles
  • RAN Location Service
  • sample collection process includes the following steps:
  • the network entity issues a sample collection request to each sample source.
  • the sample collection request may include the sample data type.
  • the sample collection request may include the data requirements in the privacy protection service request. At least one of the following: sample type, sample quantity, sample timeliness, sample scope, sample collection method, etc.
  • Each sample source collects samples according to the information in the sample collection request, for example, collecting the number of times UE1 goes to the gym between 18:00 and 20:00 every Tuesday and Thursday afternoon.
  • Each sample source reports sample data, which may be the result of processing by the sample source.
  • the first information includes one or more of the following:
  • the timeliness information of the target model is used to indicate the validity time of the target model, that is, the validity time of the trained model corresponding to the privacy protection service. Beyond this time, the 3GPP network Training needs to be performed again when the same privacy service request is received again;
  • the identification information of the target model is used to identify the model generated in this privacy protection business training, that is, a specific model, such as a heterogeneous neural network, decision tree, etc.
  • the above-mentioned first information may specifically be a model instance ID (model instance ID), which may be used to identify a model training task.
  • model instance ID model instance ID
  • the method further includes:
  • the first network device stores an association relationship between the first information, the identifier of the second network device, and the identifier of the target service.
  • the first network device associates the first information, the identifier of the second network device and the identifier of the target service, so that the first network device can later provide privacy protection data for the privacy protection service requested by the second network device.
  • the network entity has model instance ID 1, privacy protection service ID 1 and AF ID 1.
  • the model is still valid and AF1 requests privacy protection service ID 1
  • the network entity directly uses model instance ID 1 to provide privacy protection service for AF 1.
  • an embodiment of the present application provides a service processing method.
  • the execution subject of the method is a second network device.
  • the second network device is a third-party network element authorized by 3GPP, and may be an AF entity, for example.
  • Methods include:
  • Step 301 The second network device sends a first request message to the first network device, where the first request message is used to request privacy protection for the target service;
  • Step 302 The second network device receives the first information sent by the first network device, and the first information is used to respond to the first request message.
  • the second network device sends a first request message to the first network device, including:
  • the second network device sends the first request message to the first network device through the third network device;
  • the second network device receives the first information sent by the first network device, including:
  • the second network device receives the first information sent by the first network device through the third network device;
  • the target business is an authorized business.
  • the above-mentioned third network device is a 3GPP information exposure network element, which refers to a network element within 3GPP that has the function of information exchange and authorization with a third party. It can be an existing 3GPP network element or a newly added network element, such as a third-party network element. Network devices can be NEF entities.
  • the above target service is an authorized service, which specifically means that when the second network device requests privacy protection for the target service from the first network device, the third network device first determines whether the target service is authorized, that is, the second network device may Unauthorized services will be requested, but can be judged and filtered by the third network device; specifically: the third network device verifies the first request information based on the preconfigured privacy service contract, and determines whether the second network device Authorized to obtain privacy services. If it is determined that the target service is authorized, subsequent operations will be performed.
  • Embodiment 1 The first network device determines parameters related to model training based on the business requirements provided by the second network device, collects sample data within 3GPP and performs model training locally to obtain the target model;
  • the first request message includes one or more of the following:
  • the identification of the second network device which may be AF ID, for example;
  • the identification of the target service that is, the privacy protection service ID
  • the privacy protection service ID is "beam management optimization”, “user location recommendation”, “UE fitness probability estimation” wait;
  • Privacy protection level defined by 3GPP.
  • the intensity of protection and exposed content of each level are different. Definition The principle can be that the higher the level, the fewer original data features are exposed and the higher the processing complexity; specifically, the privacy protection level can be related to the basic model and sample features used in model training. For example, the higher the level, the sample feature extraction method The more complex it is, the greater the number of samples, and correspondingly, the trained model will be better at privacy protection;
  • Model performance information used to indicate the termination conditions of model training, including convergence conditions, iteration performance or model accuracy evaluation, etc.
  • Implementation Mode 2 Based on the model training related parameters provided by the second network device, the first network device collects sample data within 3GPP and performs model training locally to obtain a privacy processing method;
  • the first request message includes one or more of the following:
  • the identification of the second network device which may be AF ID, for example;
  • the identification of the target service that is, the privacy protection service ID
  • the privacy protection service ID is "beam management optimization”, “user location recommendation”, “UE fitness probability estimation” wait;
  • the relevant information of the target model refers to the relevant description of the privacy processing method, which is used to specify the basic training method adopted for privacy processing;
  • the relevant information of the target model includes one or more of the following:
  • Model training instruction information used to instruct the first network device to perform model training, that is, used to indicate that privacy protection services need to obtain privacy processing methods through model training;
  • Model training configuration information used to limit the model training configuration such as the basic model used.
  • model training configuration information includes one or more of the following:
  • Model type information (or model identification information), such as model ID, etc., is used to indicate the basic model used by the first network device, that is, used to indicate what basic model the network entity uses for modeling. Training, such as using heterogeneous neural networks, decision trees, etc.;
  • Model configuration information is used to instruct the first network device to configure parameters for the basic model used when performing model training, that is, to instruct network entities to use a certain model. More specific parameters are needed for model training to define higher-level concepts for the basic model used, such as defining the complexity and learning capabilities of the basic model.
  • Model configuration information can include, for example, the number of hidden layers for heterogeneous neural networks. , for the tree depth, number of trees, split points, etc. of the decision tree;
  • Model performance information used to indicate the termination conditions of model training, including convergence conditions, iteration performance or model accuracy evaluation, etc.;
  • Sample data requirement information including sample type, sample quantity, sample timeliness, sample range, sample collection method, etc.
  • the first information includes one or more of the following:
  • the timeliness information of the target model is used to indicate the validity time of the target model, that is, the validity time of the trained model corresponding to the privacy protection service. Beyond this time, the 3GPP network will again Training needs to be performed again when receiving the same privacy service request;
  • the identification information of the target model is used to identify the model generated in this privacy protection business training, that is, specific models such as heterogeneous neural networks, decision trees, etc.
  • the above-mentioned first information may specifically be a model instance ID (model instance ID), which may be used to identify a model training task.
  • model instance ID model instance ID
  • Example 1 The network entity determines the parameters related to model training based on the business requirements provided by AF, collects sample data within 3GPP and performs model training locally to obtain the privacy processing method;
  • AF is a third-party network element authorized by 3GPP;
  • network entity refers to a network element within 3GPP that has certain analysis, computing and AI training capabilities. It can be an existing network element of 3GPP or a new network element. Used to protect the privacy of 3GPP internal data;
  • 3GPP information exposure network elements refer to network elements within 3GPP that have the function of information interaction and authorization with third parties. They can be existing 3GPP network elements or new network elements.
  • NEF NEF
  • NFs refers to network elements in the core network, which can be AMF, SMF, PCF, etc. The specific network element is analyzed by the network entity using the demand information provided by AF.
  • the AF sends a privacy protection service request to the 3GPP network entity.
  • the request information includes at least one of the following:
  • AF identification such as AF ID
  • Privacy protection level defined by 3GPP.
  • the intensity of protection and exposed content of each level are different. The principle is that the higher the level, the fewer the original data features are exposed and the higher the processing complexity.
  • the privacy protection level can be related to the basic model and sample features used in model training. For example, the higher the level, the more complex the sample feature extraction method and the greater the number of samples. Correspondingly, the effect of the trained model on privacy protection is The better.
  • Model performance used to indicate the termination conditions of model training, including convergence conditions, iteration performance or model accuracy evaluation, etc.
  • NEF uses the AF identifier to query the privacy protection service list contracted by AF to determine whether the privacy protection service requested by AF is authorized.
  • NEF transparently forwards the privacy protection service request message to the network entity.
  • the network entity parses the privacy protection service request, including:
  • the network entity determines that training is needed to obtain the privacy processing method, and the factors that determine the need for training include at least one of the following:
  • the data required by the privacy protection business is private data, such as the implementation of private data within the terminal or 3GPP;
  • the data required by privacy protection services have the same sample but different characteristics.
  • the associated data of the same UE in different domains that is, the MM related data generated by the same UE in the CN, the location data generated in the RAN, in the third Business experience data generated by third-party services.
  • the network entity analyzes the privacy protection business requirements and determines them based on the empirical information of model training and/or the privacy protection level.
  • the network entity determines model training related information, including the following:
  • the network entity parses the privacy protection request, analyzes the complexity of completing the task, the data required, etc., and selects an appropriate basic model from the model library that can complete the task.
  • Model configuration information used to indicate the parameters configured by the first network device for the basic model used when performing model training, that is, used to specify more detailed information during the model training process, thereby defining the basic model used.
  • Higher-level concepts such as defining the complexity of the basic model, learning capabilities, and model configuration information can include, for example, the number of hidden layers for heterogeneous neural networks, tree depth, number of trees, split points, etc. for decision trees.
  • Network entities are determined based on the determined basic model and model training historical experience information.
  • Termination conditions for model training used to indicate that model training can be stopped when it reaches a certain level, such as model convergence conditions or model accuracy.
  • the number of iterations of the model, etc. The network entity determines based on the preconfiguration in the privacy protection service agreement or the model performance in the privacy protection service request.
  • Sample collection process includes the following steps:
  • the network entity issues sample collection requests to each sample source based on the sample data requirements and sample sources determined in step 4.
  • Each sample source collects samples according to the information in the sample collection request, for example, collecting the number of times UE1 goes to the gym between 18:00 and 20:00 every Tuesday and Thursday afternoon.
  • Each sample source reports sample data, which may be the result of processing by the sample source.
  • the network entity uses the collected data to train the model.
  • the network entity performs a local training process based on the obtained sample data and the model training related parameters determined in step 4 until the trained model reaches the termination condition of model training.
  • the network entity generates a model instance ID for privacy protection business training, which is used to indicate relevant information of this model training, including at least one of the following information:
  • Network entity related information which may include network entity ID, name information, etc.
  • Model timeliness including model generation time and validity duration, is used to indicate the validity time of the trained model corresponding to the privacy protection service. Beyond this time, the 3GPP network needs to receive the same privacy service request again. Training again.
  • Model identification information used to identify the model generated in this privacy protection business training.
  • the network entity associates the model instance ID, privacy protection service ID and AF ID for subsequent network use.
  • the network entity provides privacy protection data for the privacy protection service requested by the corresponding AF.
  • the network entity has model instance ID 1, privacy protection service ID 1 and AF ID 1.
  • AF1 requests privacy protection.
  • the service ID is 1, the network entity directly uses model instance ID 1 to provide privacy protection services for AF 1.
  • the network entity returns a confirmation message to AF through NEF, including the model instance ID.
  • Example 2 Based on the model training related parameters provided by AF, the network entity collects sample data within 3GPP and performs model training locally to obtain the privacy processing method;
  • AF is a third-party network element authorized by 3GPP;
  • network entity refers to a network element within 3GPP that has certain analysis, computing and AI training capabilities. It can be an existing network element of 3GPP or a new network element. Used to protect the privacy of 3GPP internal data;
  • 3GPP information exposure network elements refer to network elements within 3GPP that have the function of information interaction and authorization with third parties. They can be existing 3GPP network elements or new network elements.
  • NEF NEF
  • NFs refers to network elements in the core network, which can be AMF, SMF, PCF, etc. The specific network element is analyzed by the network entity using the demand information provided by AF.
  • the AF sends a privacy protection service request to the 3GPP network entity.
  • the request information includes at least one of the following:
  • AF identification such as AF ID
  • Privacy protection level defined by 3GPP.
  • the intensity of protection and exposed content of each level are different. The principle is that the higher the level, the fewer the original data features are exposed and the higher the processing complexity.
  • the privacy protection level can be related to the basic model and sample features used in model training. For example, the higher the level, the more complex the sample feature extraction method and the greater the number of samples. Correspondingly, the effect of the trained model on privacy protection is The better.
  • Model training instructions used to indicate that the privacy protection business needs to obtain privacy protection processing methods through model training
  • Model training configuration information used to limit the basic models used, etc., including at least one of the following:
  • Model type information (or called model identification information), such as model ID, etc., is used to indicate the basic model used by the first network device, that is, used to indicate what basic model the network entity uses for model training. , including heterogeneous neural networks, decision trees, etc.;
  • Model configuration information is used to instruct the first network device to configure parameters for the basic model used when performing model training, that is, used to instruct network entities to use a certain basic model. More specific parameters are required for model training to define higher-level concepts for the basic model used, such as defining the complexity and learning capabilities of the basic model.
  • Model configuration information can include, for example, the number of hidden layers for heterogeneous neural networks, For the tree depth, number of trees, split points, etc. of the decision tree;
  • NEF uses the AF identifier to query the privacy protection service list contracted by AF to determine whether the privacy protection service requested by AF is authorized.
  • NEF transparently forwards the privacy protection service request message to the network entity.
  • the network entity determines that it needs to perform a training process to obtain the privacy processing method.
  • the factors that determine the need for training to obtain privacy processing methods by the network entity include at least one of the following:
  • the privacy protection service request includes model training instructions
  • the data requested by the privacy protection service is private data, such as the implementation of private data within the terminal or 3GPP;
  • the data requested by the privacy protection service have the same sample but different characteristics.
  • the associated data of the same UE in different domains that is, the MM related data generated by the same UE in the CN, the location data generated in the RAN, in the Business experience data generated by third-party services.
  • the network entity determines model training related information, including the following:
  • Basic model the network entity selects a model from the model library as the basic model for training based on the model information or identification information in the privacy protection request.
  • Model configuration information used to indicate the parameters configured by the first network device for the basic model used when performing model training, that is, used to specify more detailed information during the model training process, thereby defining the basic model used.
  • Higher-level concepts such as defining the complexity of the basic model, learning capabilities, and model configuration information can include, for example, the number of hidden layers for heterogeneous neural networks, tree depth, number of trees, split points, etc. for decision trees.
  • the network entity is determined based on the model configuration information in the privacy protection request.
  • Termination conditions for model training used to indicate that model training can be stopped when it reaches a certain level, such as model convergence conditions or model accuracy.
  • the number of iterations of the model, etc. Network entities are determined based on model performance in privacy protection requests.
  • the basis for determination includes the following:
  • the network entity makes recommendations based on the data requirements in the privacy protection service request.
  • the network entity is based on the experience information and/or privacy protection level of model training.
  • Sample collection process includes the following steps:
  • the network entity issues sample collection requests to each sample source, including at least one of the data requirements in the privacy protection business request: sample type, sample quantity, sample aging, sample range, sample collection method, etc.
  • Each sample source collects samples according to the information in the sample collection request, for example, collecting the number of times UE1 goes to the gym between 18:00 and 20:00 every Tuesday and Thursday afternoon.
  • Each sample source reports sample data, which may be the result of processing by the sample source.
  • the network entity uses the collected data to train the model.
  • the network entity performs a local training process based on the obtained sample data and the model training related parameters determined in step 4 until the trained model reaches the termination condition of model training.
  • the network entity generates a model instance ID for privacy protection business training, which is used to indicate relevant information of this model training, including at least one of the following information:
  • Network entity related information which may include network entity ID, name information, etc.
  • Model timeliness including model generation time and validity duration, is used to indicate the validity time of the trained model corresponding to the privacy protection service. Beyond this time, the 3GPP network needs to receive the same privacy service request again. Training again.
  • Model identification information used to identify the model generated in this privacy protection business training.
  • the network entity associates the model instance ID, privacy protection service ID and AF ID, which is used by the network entity to provide privacy protection data for the privacy protection service requested by the corresponding AF.
  • the network entity has model instance ID 1, privacy protection Business ID 1 and AF ID 1, when the timeliness of the model is still valid, when AF1 requests the privacy protection service ID 1, the network entity directly uses the model instance ID 1 to provide the privacy protection service for AF 1.
  • the network entity returns a confirmation message to AF through NEF, including the model instance ID.
  • the execution subject may be a business processing device.
  • the business processing device executing the business processing method is taken as an example to illustrate the business processing device provided by the embodiment of the present application.
  • an embodiment of the present application provides a service processing device 500.
  • the service processing device 500 may be the first network device in the above method side description.
  • the business processing device 500 includes:
  • the first receiving module 501 is used to receive the first request message sent by the second network device, where the first request message is used to request privacy protection for the target service;
  • the first determination module 502 is used to determine model training related information according to the first request message
  • the training module 504 is used to perform model training based on sample data and model training related information to obtain a target model.
  • the target model is used to protect the privacy of data required by target business needs;
  • the first sending module 505 is configured to send first information to the second network device, where the first information is used to respond to the first request message.
  • the first receiving module is used for:
  • the first sending module is used for:
  • the target business is an authorized business.
  • the first request message includes one or more of the following:
  • the first request message includes one or more of the following:
  • the relevant information of the target model includes one or more of the following:
  • Model training instruction information used to instruct the business processing device to perform model training
  • model training configuration information includes one or more of the following:
  • Model type information used to indicate the basic model used by the business processing device
  • Model configuration information used to instruct the business processing device to configure parameters for the basic model used when performing model training
  • the first determination module is used for:
  • the first preset condition includes one or more of the following:
  • the target business operates based on private data
  • the data meeting the target business requirements have the same samples but different characteristics.
  • the first determination module is used for:
  • the second preset condition includes one or more of the following:
  • the first request message includes model training instruction information
  • the target business operates based on private data
  • the data required by the target business meet the same sample data but have different characteristics.
  • model training related information includes one or more of the following:
  • Basic model information used to indicate the basic model used by the business processing device for model training
  • Model configuration information used to instruct the business processing device to configure parameters for the basic model used when performing model training
  • Termination condition information for model training is
  • the second information is the sample data request information in the first request message, or the second information is experience information of model training.
  • the first information includes one or more of the following:
  • the device also includes:
  • the storage module is used to store the association between the first information, the identifier of the second network device, and the identifier of the target service.
  • an embodiment of the present application provides a service processing device 600.
  • the service processing device 600 may be the second network device in the above method side description.
  • the business processing device 600 includes:
  • the second sending module 601 is used to send a first request message to the first network device, where the first request message is used to request privacy protection for the target service;
  • the second receiving module 602 is configured to receive the first information sent by the first network device, where the first information is used to respond to the first request message.
  • the second sending module is used for:
  • the second receiving module is used for:
  • the target business is an authorized business.
  • the first request message includes one or more of the following:
  • the first request message includes one or more of the following:
  • the relevant information of the target model includes one or more of the following:
  • Model training instruction information used to instruct the first network to perform model training
  • model training configuration information includes one or more of the following:
  • Model type information used to indicate the basic model used by the first network device
  • Model configuration information used to indicate the parameters configured by the basic model used by the first network device when performing model training
  • the first information includes one or more of the following:
  • the business processing device in the embodiment of the present application may be an electronic device, such as an electronic device with an operating system, or may be a component in the electronic device, such as an integrated circuit or chip.
  • the electronic device may be a server, a network attached storage (Network Attached Storage, NAS), etc., which are not specifically limited in the embodiments of this application.
  • Network Attached Storage NAS
  • the business processing device provided by the embodiment of the present application can implement each process implemented by the method embodiment of Figures 2 to 4b, and achieve the same technical effect. To avoid duplication, the details will not be described here.
  • this embodiment of the present application also provides a communication device 700, which includes a processor 701 and a memory 702.
  • the memory 702 stores programs or instructions that can be run on the processor 701, such as , when the communication device 700 is a terminal, when the program or instruction is executed by the processor 701, each step of the above business processing method embodiment is implemented, and the same technical effect can be achieved.
  • the communication device 700 is a network-side device, when the program or instruction is executed by the processor 701, each step of the above business processing method embodiment is implemented, and the same technical effect can be achieved. To avoid duplication, the details are not repeated here.
  • the embodiment of the present application also provides a network side device.
  • the network side device 800 includes: a processor 801 , a network interface 802 and a memory 803 .
  • the network interface 802 is, for example, a common public radio interface (CPRI).
  • CPRI common public radio interface
  • the network side device 800 in the embodiment of the present application also includes: instructions or programs stored in the memory 803 and executable on the processor 801.
  • the processor 801 calls the instructions or programs in the memory 803 to execute Figure 5 or Figure 6
  • the execution methods of each module are shown and achieve the same technical effect. To avoid repetition, they will not be described in detail here.
  • Embodiments of the present application also provide a readable storage medium.
  • Programs or instructions are stored on the readable storage medium.
  • the program or instructions are executed by a processor, each process of the above business processing method embodiment is implemented and the same can be achieved. The technical effects will not be repeated here to avoid repetition.
  • the processor is the processor in the terminal described in the above embodiment.
  • the readable storage media includes computer-readable storage media, such as computer read-only memory (Read-Only Memory, ROM), random access memory (Random Access Memory, RAM), magnetic disks or optical disks, etc.
  • An embodiment of the present application further provides a chip.
  • the chip includes a processor and a communication interface.
  • the communication interface and The processor is coupled, and the processor is used to run programs or instructions to implement each process of the above business processing method embodiment, and can achieve the same technical effect. To avoid duplication, the details will not be described here.
  • chips mentioned in the embodiments of this application may also be called system-on-chip, system-on-a-chip, system-on-chip or system-on-chip, etc.
  • Embodiments of the present application further provide a computer program/program product.
  • the computer program/program product is stored in a storage medium.
  • the computer program/program product is executed by at least one processor to implement the above business processing method embodiment.
  • Each process can achieve the same technical effect. To avoid repetition, we will not go into details here.
  • the methods of the above embodiments can be implemented by means of software plus the necessary general hardware platform. Of course, it can also be implemented by hardware, but in many cases the former is better. implementation.
  • the technical solution of the present application can be embodied in the form of a computer software product that is essentially or contributes to related technologies.
  • the computer software product is stored in a storage medium (such as ROM/RAM, disk, CD), including several instructions to cause a terminal (which can be a mobile phone, computer, server, air conditioner, or network device, etc.) to execute the methods described in various embodiments of this application.

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Data Mining & Analysis (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Life Sciences & Earth Sciences (AREA)
  • Artificial Intelligence (AREA)
  • Evolutionary Computation (AREA)
  • General Engineering & Computer Science (AREA)
  • Signal Processing (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Computer Vision & Pattern Recognition (AREA)
  • Biophysics (AREA)
  • Computer Security & Cryptography (AREA)
  • Bioinformatics & Computational Biology (AREA)
  • Bioinformatics & Cheminformatics (AREA)
  • Health & Medical Sciences (AREA)
  • Biomedical Technology (AREA)
  • Evolutionary Biology (AREA)
  • Computational Linguistics (AREA)
  • General Health & Medical Sciences (AREA)
  • Molecular Biology (AREA)
  • Computing Systems (AREA)
  • Mathematical Physics (AREA)
  • Software Systems (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The present application belongs to the technical field of communications. Disclosed are a service processing method, and a device and a readable storage medium. The method comprises: a first network device receiving a first request message, which is sent by a second network device, wherein the first request message is used for requesting privacy protection for a target service; the first network device determining model training related information according to the first request message; the first network device acquiring sample data; the first network device performing model training according to the sample data and the model training related information, so as to obtain a target model, wherein the target model is used for performing privacy protection on data that the target service requires; and the first network device sending first information to the second network device, wherein the first information is used for responding to the first request message.

Description

业务处理方法、设备及可读存储介质Business processing methods, equipment and readable storage media
相关申请的交叉引用Cross-references to related applications
本申请主张在2022年05月13日在中国提交的中国专利申请No.202210523618.0的优先权,其全部内容通过引用包含于此。This application claims priority to Chinese Patent Application No. 202210523618.0 filed in China on May 13, 2022, the entire content of which is incorporated herein by reference.
技术领域Technical field
本申请属于通信技术领域,具体涉及一种业务处理方法、设备及可读存储介质。This application belongs to the field of communication technology, and specifically relates to a business processing method, equipment and readable storage medium.
背景技术Background technique
5G驱动万物互联,各类数据也成爆炸式增长,同样的第三代合作伙伴计划(3rd Generation Partnership Project,3GPP)网络内部也持有大量数据,这些数据能为第三方应用提供一定帮助,但是大量信息进行流通,网络内部数据隐私无法得到保护。5G drives the Internet of Everything, and all kinds of data have exploded. The same 3rd Generation Partnership Project (3GPP) network also holds a large amount of data, which can provide certain help to third-party applications. However, A large amount of information circulates, and data privacy within the network cannot be protected.
发明内容Contents of the invention
本申请实施例提供一种业务处理方法、设备及可读存储介质,能够解决在为第三方应用提供网络内部数据时,网络内部数据隐私无法得到保护的问题。Embodiments of the present application provide a business processing method, equipment, and a readable storage medium, which can solve the problem that the privacy of data within the network cannot be protected when providing internal network data to third-party applications.
第一方面,提供了一种业务处理方法,包括:The first aspect provides a business processing method, including:
第一网络设备接收第二网络设备发送的第一请求消息,所述第一请求消息用于请求对目标业务进行隐私保护;The first network device receives a first request message sent by the second network device, where the first request message is used to request privacy protection for the target service;
所述第一网络设备根据所述第一请求消息,确定模型训练相关信息;The first network device determines model training related information according to the first request message;
所述第一网络设备获取样本数据;The first network device obtains sample data;
所述第一网络设备根据所述样本数据和所述模型训练相关信息进行模型训练,得到目标模型,所述目标模型用于对所述目标业务需求的数据进行隐私保护;The first network device performs model training based on the sample data and the model training related information to obtain a target model, and the target model is used to protect the privacy of the data required by the target business;
所述第一网络设备向所述第二网络设备发送第一信息,所述第一信息用于响应第一请求消息。The first network device sends first information to the second network device, where the first information is used in response to the first request message.
第二方面,提供了一种业务处理方法,包括:The second aspect provides a business processing method, including:
第二网络设备向第一网络设备发送第一请求消息,所述第一请求消息用于请求对目标业务进行隐私保护;The second network device sends a first request message to the first network device, where the first request message is used to request privacy protection for the target service;
所述第二网络设备接收所述第一网络设备发送的第一信息,所述第一信息用于响应第一请求消息。The second network device receives the first information sent by the first network device, and the first information is used to respond to the first request message.
第三方面,提供了一种业务处理装置,包括:In a third aspect, a business processing device is provided, including:
第一接收模块,用于接收第二网络设备发送的第一请求消息,所述第一请求消息用于 请求对目标业务进行隐私保护;The first receiving module is configured to receive a first request message sent by the second network device, where the first request message is used to Request privacy protection for the target business;
第一确定模块,用于根据所述第一请求消息,确定模型训练相关信息;A first determination module, configured to determine model training related information according to the first request message;
获取模块,用于获取样本数据;Obtain module, used to obtain sample data;
训练模块,用于根据所述样本数据和所述模型训练相关信息进行模型训练,得到目标模型,所述目标模型用于对所述目标业务需求的数据进行隐私保护;A training module, configured to perform model training based on the sample data and the model training related information to obtain a target model, where the target model is used to protect the privacy of the data required by the target business;
第一发送模块,用于向所述第二网络设备发送第一信息,所述第一信息用于响应第一请求消息。The first sending module is configured to send first information to the second network device, where the first information is used to respond to the first request message.
第四方面,提供了一种业务处理装置,包括:In the fourth aspect, a business processing device is provided, including:
第二发送模块,用于向第一网络设备发送第一请求消息,所述第一请求消息用于请求对目标业务进行隐私保护;A second sending module, configured to send a first request message to the first network device, where the first request message is used to request privacy protection for the target service;
第二接收模块,用于接收所述第一网络设备发送的第一信息,所述第一信息用于响应第一请求消息。The second receiving module is configured to receive the first information sent by the first network device, where the first information is used to respond to the first request message.
第五方面,提供了一种网络侧设备,该网络侧设备包括处理器和存储器,所述存储器存储可在所述处理器上运行的程序或指令,所述程序或指令被所述处理器执行时实现如第一方面所述的方法的步骤。In a fifth aspect, a network side device is provided. The network side device includes a processor and a memory. The memory stores programs or instructions that can be run on the processor. The program or instructions are executed by the processor. When implementing the steps of the method described in the first aspect.
第六方面,提供了一种网络侧设备,包括处理器及通信接口,其中,所述通信接口用于,第一网络设备接收第二网络设备发送的第一请求消息,所述第一请求消息用于请求对目标业务进行隐私保护;所述处理器用于,所述第一网络设备根据所述第一请求消息,确定模型训练相关信息;所述通信接口用于,所述第一网络设备获取样本数据;所述处理器用于,所述第一网络设备根据所述样本数据和所述模型训练相关信息进行模型训练,得到目标模型,所述目标模型用于对所述目标业务需求的数据进行隐私保护;所述通信接口用于,所述第一网络设备向所述第二网络设备发送第一信息,所述第一信息用于响应第一请求消息。In a sixth aspect, a network side device is provided, including a processor and a communication interface, wherein the communication interface is used for a first network device to receive a first request message sent by a second network device, and the first request message is used to request privacy protection for the target service; the processor is used for the first network device to determine model training related information according to the first request message; the communication interface is used for the first network device to obtain Sample data; the processor is configured to: the first network device performs model training according to the sample data and the model training related information to obtain a target model, and the target model is used to perform data on the target business requirements. Privacy protection: the communication interface is used for the first network device to send first information to the second network device, and the first information is used to respond to the first request message.
第七方面,提供了一种网络侧设备,该网络侧设备包括处理器和存储器,所述存储器存储可在所述处理器上运行的程序或指令,所述程序或指令被所述处理器执行时实现如第二方面所述的方法的步骤。In a seventh aspect, a network side device is provided. The network side device includes a processor and a memory. The memory stores programs or instructions that can be run on the processor. The program or instructions are executed by the processor. When implementing the steps of the method described in the second aspect.
第八方面,提供了一种网络侧设备,包括处理器及通信接口,其中,所述通信接口用于,第二网络设备向第一网络设备发送第一请求消息,所述第一请求消息用于请求对目标业务进行隐私保护;所述第二网络设备接收所述第一网络设备发送的第一信息,所述第一信息用于响应第一请求消息。In an eighth aspect, a network side device is provided, including a processor and a communication interface, wherein the communication interface is used for the second network device to send a first request message to the first network device, and the first request message is In order to request privacy protection for the target service, the second network device receives the first information sent by the first network device, and the first information is used to respond to the first request message.
第九方面,提供了一种可读存储介质,所述可读存储介质上存储程序或指令,所述程序或指令被处理器执行时实现如第一方面所述的方法的步骤,或者实现如第二方面所述的方法的步骤。In a ninth aspect, a readable storage medium is provided. Programs or instructions are stored on the readable storage medium. When the programs or instructions are executed by a processor, the steps of the method described in the first aspect are implemented, or the steps of the method are implemented as described in the first aspect. The steps of the method described in the second aspect.
第十方面,提供了一种芯片,所述芯片包括处理器和通信接口,所述通信接口和所述处理器耦合,所述处理器用于运行程序或指令,实现如第一方面所述的方法的步骤,或者 实现如第二方面所述的方法的步骤。In a tenth aspect, a chip is provided. The chip includes a processor and a communication interface. The communication interface is coupled to the processor. The processor is used to run programs or instructions to implement the method described in the first aspect. steps, or Implement the steps of the method as described in the second aspect.
第十一方面,提供了一种计算机程序/程序产品,所述计算机程序/程序产品被存储在存储介质中,所述计算机程序/程序产品被至少一个处理器执行以实现如第一方面所述的方法的步骤,或者实现如第二方面所述的方法的步骤。In an eleventh aspect, a computer program/program product is provided, the computer program/program product is stored in a storage medium, and the computer program/program product is executed by at least one processor to implement the first aspect The steps of the method, or the steps of implementing the method as described in the second aspect.
在本申请实施例中,第二网络设备向第一网络设备请求对目标业务进行隐私保护,第一网络设备根据确定出的模型训练相关信息和获取到的样本数据进行模型训练,得到用于对目标业务需求的数据进行隐私处理的目标模型。这样,网络在为第三方应用提供网络内部数据时,可以通过目标模型对数据进行隐私处理,使网络内部数据隐私得到保护。In this embodiment of the present application, the second network device requests the first network device to perform privacy protection on the target service. The first network device performs model training based on the determined model training related information and the obtained sample data, and obtains A target model for privacy processing of data required by target business needs. In this way, when the network provides internal network data to third-party applications, it can perform privacy processing on the data through the target model, so that the privacy of internal network data is protected.
附图说明Description of the drawings
图1是本申请实施例提供的无线通信系统的框图;Figure 1 is a block diagram of a wireless communication system provided by an embodiment of the present application;
图2是本申请实施例提供的业务处理方法的流程示意图之一;Figure 2 is one of the flow diagrams of the business processing method provided by the embodiment of the present application;
图3是本申请实施例提供的业务处理方法的流程示意图之二;Figure 3 is the second schematic flow chart of the business processing method provided by the embodiment of the present application;
图4a是本申请实施例提供的实施示例的流程示意图之一;Figure 4a is one of the flow diagrams of an implementation example provided by the embodiment of this application;
图4b是本申请实施例提供的实施示例的流程示意图之二;Figure 4b is the second schematic flow diagram of an implementation example provided by the embodiment of the present application;
图5是本申请实施例提供的业务处理装置的结构示意图之一;Figure 5 is one of the structural schematic diagrams of the business processing device provided by the embodiment of the present application;
图6是本申请实施例提供的业务处理装置的结构示意图之二;Figure 6 is the second structural schematic diagram of the business processing device provided by the embodiment of the present application;
图7是本申请实施例提供的通信设备的结构示意图;Figure 7 is a schematic structural diagram of a communication device provided by an embodiment of the present application;
图8是本申请实施例提供的网络侧设备的结构示意图。Figure 8 is a schematic structural diagram of a network-side device provided by an embodiment of the present application.
具体实施方式Detailed ways
下面将结合本申请实施例中的附图,对本申请实施例中的技术方案进行清楚描述,显然,所描述的实施例是本申请一部分实施例,而不是全部的实施例。基于本申请中的实施例,本领域普通技术人员所获得的所有其他实施例,都属于本申请保护的范围。The technical solutions in the embodiments of the present application will be clearly described below with reference to the accompanying drawings in the embodiments of the present application. Obviously, the described embodiments are part of the embodiments of the present application, but not all of the embodiments. Based on the embodiments in this application, all other embodiments obtained by those of ordinary skill in the art fall within the scope of protection of this application.
本申请的说明书和权利要求书中的术语“第一”、“第二”等是用于区别类似的对象,而不用于描述特定的顺序或先后次序。应该理解这样使用的术语在适当情况下可以互换,以便本申请的实施例能够以除了在这里图示或描述的那些以外的顺序实施,且“第一”、“第二”所区别的对象通常为一类,并不限定对象的个数,例如第一对象可以是一个,也可以是多个。此外,说明书以及权利要求中“和/或”表示所连接对象的至少其中之一,字符“/”一般表示前后关联对象是一种“或”的关系。The terms "first", "second", etc. in the description and claims of this application are used to distinguish similar objects and are not used to describe a specific order or sequence. It is to be understood that the terms so used are interchangeable under appropriate circumstances so that the embodiments of the present application can be practiced in sequences other than those illustrated or described herein, and that "first" and "second" are distinguished objects It is usually one type, and the number of objects is not limited. For example, the first object can be one or multiple. In addition, "and/or" in the description and claims indicates at least one of the connected objects, and the character "/" generally indicates that the related objects are in an "or" relationship.
值得指出的是,本申请实施例所描述的技术不限于长期演进型(Long Term Evolution,LTE)/LTE的演进(LTE-Advanced,LTE-A)系统,还可用于其他无线通信系统,诸如码分多址(Code Division Multiple Access,CDMA)、时分多址(Time Division Multiple Access,TDMA)、频分多址(Frequency Division Multiple Access,FDMA)、正交频分多址(Orthogonal  Frequency Division Multiple Access,OFDMA)、单载波频分多址(Single-carrier Frequency Division Multiple Access,SC-FDMA)和其他系统。本申请实施例中的术语“系统”和“网络”常被可互换地使用,所描述的技术既可用于以上提及的系统和无线电技术,也可用于其他系统和无线电技术。以下描述出于示例目的描述了新空口(New Radio,NR)系统,并且在以下大部分描述中使用NR术语,但是这些技术也可应用于NR系统应用以外的应用,如第6代(6th Generation,6G)通信系统。It is worth pointing out that the technology described in the embodiments of this application is not limited to Long Term Evolution (LTE)/LTE Evolution (LTE-Advanced, LTE-A) systems, and can also be used in other wireless communication systems, such as code Code Division Multiple Access (CDMA), Time Division Multiple Access (TDMA), Frequency Division Multiple Access (FDMA), Orthogonal Frequency Division Multiple Access (Orthogonal Frequency Division Multiple Access (OFDMA), Single-carrier Frequency Division Multiple Access (SC-FDMA) and other systems. The terms "system" and "network" in the embodiments of this application are often used interchangeably, and the described technology can be used not only for the above-mentioned systems and radio technologies, but also for other systems and radio technologies. The following description describes a New Radio (NR) system for example purposes, and NR terminology is used in much of the following description, but these techniques can also be applied to applications other than NR system applications, such as 6th generation Generation, 6G) communication system.
图1示出本申请实施例可应用的一种无线通信系统的框图。无线通信系统包括终端11和网络侧设备12。其中,终端11可以是手机、平板电脑(Tablet Personal Computer)、膝上型电脑(Laptop Computer)或称为笔记本电脑、个人数字助理(Personal Digital Assistant,PDA)、掌上电脑、上网本、超级移动个人计算机(ultra-mobile personal computer,UMPC)、移动上网装置(Mobile Internet Device,MID)、增强现实(augmented reality,AR)/虚拟现实(virtual reality,VR)设备、机器人、可穿戴式设备(Wearable Device)、车载设备(Vehicle User Equipment,VUE)、行人终端(Pedestrian User Equipment,PUE)、智能家居(具有无线通信功能的家居设备,如冰箱、电视、洗衣机或者家具等)、游戏机、个人计算机(personal computer,PC)、柜员机或者自助机等终端侧设备,可穿戴式设备包括:智能手表、智能手环、智能耳机、智能眼镜、智能首饰(智能手镯、智能手链、智能戒指、智能项链、智能脚镯、智能脚链等)、智能腕带、智能服装等。需要说明的是,在本申请实施例并不限定终端11的具体类型。网络侧设备12可以包括接入网设备或核心网设备,其中,接入网设备也可以称为无线接入网设备、无线接入网(Radio Access Network,RAN)、无线接入网功能或无线接入网单元。接入网设备可以包括基站、无线局域网(Wireless Local Area Network,WLAN)接入点、无线保真(Wireless Fidelity,WiFi)节点等,基站可被称为节点B、演进节点B(eNB)、接入点、基收发机站(Base Transceiver Station,BTS)、无线电基站、无线电收发机、基本服务集(Basic Service Set,BSS)、扩展服务集(Extended Service Set,ESS)、家用B节点、家用演进型B节点、发送接收点(Transmitting Receiving Point,TRP)或所述领域中其他某个合适的术语,只要达到相同的技术效果,所述基站不限于特定技术词汇,需要说明的是,在本申请实施例中仅以NR系统中的基站为例进行介绍,并不限定基站的具体类型。核心网设备可以包含但不限于如下至少一项:核心网节点、核心网功能、移动管理实体(Mobility Management Entity,MME)、接入移动管理功能(Access and Mobility Management Function,AMF)、会话管理功能(Session Management Function,SMF)、用户平面功能(User Plane Function,UPF)、策略控制功能(Policy Control Function,PCF)、策略与计费规则功能单元(Policy and Charging Rules Function,PCRF)、边缘应用服务发现功能(Edge Application Server Discovery Function,EASDF)、统一数据管理(Unified Data Management,UDM)、统一数据仓储(Unified Data Repository,UDR)、归属用户服务器(Home Subscriber Server,HSS)、集中式网络配置(Centralized network configuration,CNC)、网络存储功能(Network Repository Function,NRF)、网络开放功能(Network  Exposure Function,NEF)、本地NEF(Local NEF,或L-NEF)、绑定支持功能(Binding Support Function,BSF)、应用功能(Application Function,AF)等。需要说明的是,在本申请实施例中仅以NR系统中的核心网设备为例进行介绍,并不限定核心网设备的具体类型。Figure 1 shows a block diagram of a wireless communication system to which embodiments of the present application are applicable. The wireless communication system includes a terminal 11 and a network side device 12. The terminal 11 may be a mobile phone, a tablet computer (Tablet Personal Computer), a laptop computer (Laptop Computer), or a notebook computer, a personal digital assistant (Personal Digital Assistant, PDA), a palmtop computer, a netbook, or a super mobile personal computer. (ultra-mobile personal computer, UMPC), mobile Internet device (Mobile Internet Device, MID), augmented reality (AR)/virtual reality (VR) equipment, robots, wearable devices (Wearable Device) , Vehicle User Equipment (VUE), Pedestrian User Equipment (PUE), smart home (home equipment with wireless communication functions, such as refrigerators, TVs, washing machines or furniture, etc.), game consoles, personal computers (personal computer, PC), teller machine or self-service machine and other terminal-side devices. Wearable devices include: smart watches, smart bracelets, smart headphones, smart glasses, smart jewelry (smart bracelets, smart bracelets, smart rings, smart necklaces, smart anklets) bracelets, smart anklets, etc.), smart wristbands, smart clothing, etc. It should be noted that the embodiment of the present application does not limit the specific type of the terminal 11. The network side device 12 may include an access network device or a core network device, where the access network device may also be called a radio access network device, a radio access network (Radio Access Network, RAN), a radio access network function or a wireless device. access network unit. Access network equipment may include base stations, Wireless Local Area Network (WLAN) access points, Wireless Fidelity (WiFi) nodes, etc. The base station may be called a Node B, an Evolved Node B (eNB), or an access point. Entry point, Base Transceiver Station (BTS), radio base station, radio transceiver, Basic Service Set (BSS), Extended Service Set (ESS), home B-node, home evolution Type B node, Transmitting Receiving Point (TRP) or some other suitable terminology in the field, as long as the same technical effect is achieved, the base station is not limited to specific technical terms. It should be noted that in this application, In the embodiment, only the base station in the NR system is taken as an example for introduction, and the specific type of the base station is not limited. Core network equipment may include but is not limited to at least one of the following: core network nodes, core network functions, mobility management entities (Mobility Management Entity, MME), access mobility management functions (Access and Mobility Management Function, AMF), session management functions (Session Management Function, SMF), User Plane Function (UPF), Policy Control Function (PCF), Policy and Charging Rules Function (PCRF), Edge Application Service Discovery function (Edge Application Server Discovery Function, EASDF), Unified Data Management (UDM), Unified Data Repository (UDR), Home Subscriber Server (HSS), Centralized network configuration ( Centralized network configuration (CNC), network storage function (Network Repository Function, NRF), network opening function (Network Exposure Function (NEF), local NEF (Local NEF, or L-NEF), binding support function (Binding Support Function, BSF), application function (Application Function, AF), etc. It should be noted that in the embodiment of this application, only the core network equipment in the NR system is used as an example for introduction, and the specific type of the core network equipment is not limited.
为更好理解本申请的技术方案,首先对以下内容进行介绍:In order to better understand the technical solution of this application, the following content is first introduced:
网络开放功能(Network Exposure Function,NEF):Network Exposure Function (NEF):
NEF是3GPP内部的一个网元,通过特定的接口与3GPP授权的第三方进行信息交互,5G网络具体可对外曝光的能力包括:NEF is a network element within 3GPP that interacts with third parties authorized by 3GPP through specific interfaces. The specific capabilities of the 5G network that can be exposed to the outside include:
监控能力:用于监控5G系统中UE的特定事件,并使这些监控事件信息通过NEF进行外部暴露。监控事件主要包括UE位置,可达性,漫游状态和连接状态等;Monitoring capability: used to monitor specific events of UE in the 5G system and expose these monitoring event information externally through NEF. Monitoring events mainly include UE location, reachability, roaming status and connection status, etc.;
安全报告能力:包括身份认证、授权控制、网络防御等服务,或者第三方应用通过对被授权的切片进行管理从而实现对网络安全能力的配置与调整。Security reporting capabilities: Including identity authentication, authorization control, network defense and other services, or third-party applications manage authorized slices to configure and adjust network security capabilities.
现在的3GPP网络只能通过NEF与第三方进行信息交互,一方面3GPP与第三方交互的信息不够充足,使得大量有用的信息不能够进行有效的流通,数据存在的价值无法体现。另一方面,若大量信息进行流通,网络内部数据隐私怎么得到保护还不清楚。The current 3GPP network can only exchange information with third parties through NEF. On the one hand, the information exchanged between 3GPP and third parties is not sufficient, so that a large amount of useful information cannot be effectively circulated, and the value of the data cannot be reflected. On the other hand, if a large amount of information is circulated, it is not clear how data privacy within the network can be protected.
下面结合附图,通过一些实施例及其应用场景对本申请实施例提供的业务处理方法进行详细地说明。The business processing method provided by the embodiments of the present application will be described in detail below with reference to the accompanying drawings through some embodiments and application scenarios.
参见图2,本申请实施例提供一种业务处理方法,该方法的执行主体为第一网络设备,该第一网络设备指的是3GPP内部具备一定分析,计算和人工智能(Artificial Intelligence,AI)训练能力的网元,可以是3GPP现有网元,也可以是新增网元,用于对3GPP内部数据进行隐私保护,该第一网络设备可以简称为网络实体;Referring to Figure 2, an embodiment of the present application provides a service processing method. The execution subject of the method is a first network device. The first network device refers to a device that has certain analysis, calculation and artificial intelligence (AI) capabilities within 3GPP. The network element with the training capability can be an existing 3GPP network element or a newly added network element, which is used to protect the privacy of 3GPP internal data. The first network device can be referred to as a network entity for short;
方法包括:Methods include:
步骤201:第一网络设备接收第二网络设备发送的第一请求消息,第一请求消息用于请求对目标业务进行隐私保护,目标业务也可以称为隐私保护业务;Step 201: The first network device receives a first request message sent by the second network device. The first request message is used to request privacy protection for a target service. The target service may also be called a privacy protection service;
步骤202:第一网络设备根据第一请求消息,确定模型训练相关信息;Step 202: The first network device determines model training related information according to the first request message;
步骤203:第一网络设备获取样本数据;Step 203: The first network device obtains sample data;
步骤204:第一网络设备根据样本数据和模型训练相关信息进行模型训练,得到目标模型,目标模型用于对目标业务需求的数据进行隐私保护,目标模型也可以称为目标算法、隐私处理方法、隐私处理算法等;Step 204: The first network device performs model training based on the sample data and model training related information to obtain a target model. The target model is used to protect the privacy of data required by the target business. The target model can also be called a target algorithm, a privacy processing method, Privacy processing algorithms, etc.;
步骤205:第一网络设备向第二网络设备发送第一信息,第一信息用于响应第一请求消息。Step 205: The first network device sends the first information to the second network device, and the first information is used to respond to the first request message.
上述第二网络设备是3GPP授权的第三方网元,例如可以是应用功能(Application Function,AF)实体。The above-mentioned second network device is a third-party network element authorized by 3GPP, and may be an application function (Application Function, AF) entity, for example.
在本申请实施例中,第二网络设备向第一网络设备请求对目标业务进行隐私保护,第一网络设备根据确定出的模型训练相关信息和获取到的样本数据进行模型训练,得到用于对目标业务需求的数据进行隐私处理的目标模型。这样,网络在为第三方应用提供网络内 部数据时,可以通过目标模型对数据进行隐私处理,使网络内部数据隐私得到保护。In this embodiment of the present application, the second network device requests the first network device to perform privacy protection on the target service. The first network device performs model training based on the determined model training related information and the obtained sample data, and obtains A target model for privacy processing of data required by target business needs. In this way, the network provides in-network When collecting external data, the data can be processed privately through the target model to protect the privacy of data within the network.
进一步地,采用本申请实施例的方法能够让更多类别的网络内部数据在保障隐私安全的前提下与第三方进行交互,从而实现3GPP与第三方能够进行大量数据交互,提高数据价值。Furthermore, using the methods of the embodiments of this application can allow more types of internal network data to interact with third parties while ensuring privacy and security, thereby enabling 3GPP and third parties to interact with a large amount of data and increase the value of the data.
在一种可能的实施方式中,第一网络设备接收第二网络设备发送的第一请求消息,包括:第一网络设备通过第三网络设备接收第二网络设备发送的第一请求消息;In a possible implementation, the first network device receiving the first request message sent by the second network device includes: the first network device receiving the first request message sent by the second network device through the third network device;
在一种可能的实施方式中,第一网络设备向第二网络设备发送第一信息,包括:第一网络设备通过第三网络设备向第二网络设备发送第一信息;In a possible implementation, the first network device sending the first information to the second network device includes: the first network device sending the first information to the second network device through the third network device;
其中,目标业务为被授权的业务。Among them, the target business is an authorized business.
上述第三网络设备为3GPP信息暴露网元,指的是3GPP内部具备与第三方进行信息交互和授权功能的网元,可以是3GPP现有网元,也可以是新增网元,例如第三网络设备可以是NEF实体。The above-mentioned third network device is a 3GPP information exposure network element, which refers to a network element within 3GPP that has the function of information exchange and authorization with a third party. It can be an existing 3GPP network element or a newly added network element, such as a third-party network element. Network devices can be NEF entities.
上述目标业务为被授权的业务,具体指第二网络设备在向第一网络设备请求对目标业务进行隐私保护时,首先由第三网络设备判断该目标业务是否被授权,即第二网络设备可能会请求不被授权的业务,但可以通过第三网络设备进行判断过滤;具体地:第三网络设备依据预配置的隐私业务签约,对第一请求信息进行验证,判断所述第二网络设备是否被授权获取隐私业务。若判定目标业务被授权再执行后续操作。The above target service is an authorized service, which specifically means that when the second network device requests privacy protection for the target service from the first network device, the third network device first determines whether the target service is authorized, that is, the second network device may Unauthorized services will be requested, but can be judged and filtered by the third network device; specifically: the third network device verifies the first request information based on the preconfigured privacy service contract, and determines whether the second network device Authorized to obtain privacy services. If it is determined that the target service is authorized, subsequent operations will be performed.
在具体实施中,基于第二网络设备发送的第一请求消息中信息内容,可以分为两种具体的实施方式:In specific implementation, based on the information content in the first request message sent by the second network device, it can be divided into two specific implementation modes:
实施方式一:第一网络设备基于第二网络设备提供的业务需求确定模型训练相关参数,在3GPP内部收集样本数据并本地进行模型训练得到目标模型;Embodiment 1: The first network device determines parameters related to model training based on the business requirements provided by the second network device, collects sample data within 3GPP and performs model training locally to obtain the target model;
第一请求消息包括以下一项或者多项:The first request message includes one or more of the following:
(1)第二网络设备的标识,例如可以是AF ID;(1) The identification of the second network device, which may be AF ID, for example;
(2)目标业务的标识,即隐私保护业务ID,用于标识想要请求的隐私保护业务,例如隐私保护业务ID为“波束管理优化”,“用户位置推荐”,“UE健身概率预估”等;(2) The identification of the target service, that is, the privacy protection service ID, is used to identify the privacy protection service you want to request. For example, the privacy protection service ID is "beam management optimization", "user location recommendation", "UE fitness probability estimation" wait;
(3)隐私保护等级,由3GPP定义,每个等级保护的强度和暴露的内容不同,定义原则可以是等级越高,暴露的原始数据特征越少且处理复杂度越高。具体地,隐私保护等级可以与模型训练时采用的基础模型和样本特征相关,例如等级越高,样本特征提取方式越复杂,样本数量越多,对应地,训练出的模型在进行隐私保护时效果越好;(3) Privacy protection level, defined by 3GPP. The intensity of protection and exposed content of each level are different. The definition principle can be that the higher the level, the fewer the original data features are exposed and the higher the processing complexity. Specifically, the privacy protection level can be related to the basic model and sample features used in model training. For example, the higher the level, the more complex the sample feature extraction method and the greater the number of samples. Correspondingly, the effect of the trained model on privacy protection is The better;
(4)模型性能信息,用于指示模型训练的终止条件,包括收敛条件,迭代性能或模型准确度评价等。(4) Model performance information, used to indicate the termination conditions of model training, including convergence conditions, iteration performance or model accuracy evaluation, etc.
第一网络设备根据第一请求消息,确定模型训练相关信息,包括:The first network device determines model training related information according to the first request message, including:
在满足第一预设条件的情况下,第一网络设备根据第一请求消息,确定模型训练相关信息;When the first preset condition is met, the first network device determines model training related information according to the first request message;
上述第一预设条件指的是第一网络设备解析第一请求消息以确定模型训练相关信息 的前提条件。The above-mentioned first preset condition refers to the first network device parsing the first request message to determine model training related information. prerequisites.
其中,第一预设条件包括以下一项或者多项:Among them, the first preset condition includes one or more of the following:
(1)目标业务基于隐私数据运行,即隐私保护业务需求的数据是隐私数据,例如终端或3GPP内部有关于实现的隐私数据;(1) The target business operates based on privacy data, that is, the data required by the privacy protection business is private data, such as the implementation of privacy data within the terminal or 3GPP;
(2)目标业务需求的数据满足样本相同,特征不同,即隐私保护业务需求的数据具有样本相同,特征不同的特点,也就是数据性质不同,即特征不同,但是有重叠的样本ID。例如同一用户设备(User Equipment,UE)在不同域的关联数据,即同一个UE在核心网(Core Network,CN)中产生的移动管理(Movement Measurement,MM)相关数据,在RAN产生的位置数据,在第三方服务产生的业务体验数据,利用具备不同的特征的样本进行训练,可达到特征增加的建模效果。(2) The data required by the target business needs have the same sample but different characteristics, that is, the data required by the privacy protection business needs the same sample but different characteristics, that is, the nature of the data is different, that is, the characteristics are different, but there are overlapping sample IDs. For example, the associated data of the same user equipment (User Equipment, UE) in different domains, that is, the mobility management (Movement Measurement, MM) related data generated by the same UE in the core network (Core Network, CN), and the location data generated in the RAN. , using samples with different characteristics for training on business experience data generated by third-party services, it can achieve a modeling effect of increased features.
实施方式二:第一网络设备基于第二网络设备提供的模型训练相关参数,在3GPP内部收集样本数据并本地进行模型训练得到隐私处理方法;Implementation Mode 2: Based on the model training related parameters provided by the second network device, the first network device collects sample data within 3GPP and performs model training locally to obtain a privacy processing method;
第一请求消息包括以下一项或者多项:The first request message includes one or more of the following:
(1)第二网络设备的标识,例如可以是AF ID;(1) The identification of the second network device, which may be AF ID, for example;
(2)目标业务的标识,即隐私保护业务ID,用于标识想要请求的隐私保护业务,例如隐私保护业务ID为“波束管理优化”,“用户位置推荐”,“UE健身概率预估”等;(2) The identification of the target service, that is, the privacy protection service ID, is used to identify the privacy protection service you want to request. For example, the privacy protection service ID is "beam management optimization", "user location recommendation", "UE fitness probability estimation" wait;
(3)隐私保护等级,由3GPP定义,每个等级保护的强度和暴露的内容不同,定义原则可以是等级越高,暴露的原始数据特征越少且处理复杂度越高;具体地,隐私保护等级可以与模型训练时采用的基础模型和样本特征相关,例如等级越高,样本特征提取方式越复杂,样本数量越多,对应地,训练出的模型在进行隐私保护时效果越好。(3) Privacy protection level, defined by 3GPP. The intensity of protection and exposed content of each level are different. The definition principle can be that the higher the level, the fewer the original data features are exposed and the higher the processing complexity; specifically, privacy protection The level can be related to the basic model and sample features used in model training. For example, the higher the level, the more complex the sample feature extraction method and the greater the number of samples. Correspondingly, the trained model is better at privacy protection.
(4)目标模型的相关信息,指的是隐私处理方法的相关描述,用于指定隐私处理采取的基础训练方法;(4) The relevant information of the target model refers to the relevant description of the privacy processing method, which is used to specify the basic training method adopted for privacy processing;
其中,目标模型的相关信息,包括以下一项或者多项:Among them, the relevant information of the target model includes one or more of the following:
(4.1)模型训练指示信息,用于指示第一网络设备进行模型训练,即用于指示隐私保护业务需要通过模型训练获得隐私处理方法;(4.1) Model training instruction information, used to instruct the first network device to perform model training, that is, used to indicate that privacy protection services need to obtain privacy processing methods through model training;
(4.2)模型训练配置信息,用于限定使用的基础模型等模型训练配置。(4.2) Model training configuration information, used to limit the model training configuration such as the basic model used.
具体地,模型训练配置信息,包括以下一项或者多项:Specifically, model training configuration information includes one or more of the following:
(4.2.1)模型类型信息(或者称之为模型标识信息),例如模型(model)ID等,用于指示所述第一网络设备使用的基础模型。也即用于指示网络实体使用什么基础模型进行模型训练,例如使用异构神经网络,决策树等;(4.2.1) Model type information (or model identification information), such as model ID, etc., is used to indicate the basic model used by the first network device. That is, it is used to instruct network entities what basic model to use for model training, such as using heterogeneous neural networks, decision trees, etc.;
(4.2.2)模型配置信息,与模型类型信息匹配绑定,用于指示所述第一网络设备进行模型训练时为使用的基础模型配置的参数,也即用于指示网络实体使用某种模型进行模型训练时需要的更加具体的参数,从而为使用的基础模型定义更高层的概念,如定义基础模型的复杂性、学习能力等,模型配置信息可以包括例如针对异构神经网络的隐藏层数,针对决策树的树深度、树数量、分离(split)点等; (4.2.2) Model configuration information, matched and bound with model type information, is used to instruct the first network device to configure parameters for the basic model used when performing model training, that is, to instruct network entities to use a certain model. More specific parameters are needed for model training to define higher-level concepts for the basic model used, such as defining the complexity and learning capabilities of the basic model. Model configuration information can include, for example, the number of hidden layers for heterogeneous neural networks. , for the tree depth, number of trees, split points, etc. of the decision tree;
(4.2.3)模型性能信息,用于指示模型训练的终止条件,包括收敛条件,迭代性能或模型准确度评价等;(4.2.3) Model performance information, used to indicate the termination conditions of model training, including convergence conditions, iteration performance or model accuracy evaluation, etc.;
(4.2.4)样本数据要求信息,包括样本类型,样本数量,样本时效,样本范围,样本搜集方式等。(4.2.4) Sample data requirement information, including sample type, sample quantity, sample timeliness, sample range, sample collection method, etc.
第一网络设备根据第一请求消息,确定模型训练相关信息,包括:The first network device determines model training related information according to the first request message, including:
在满足第二预设条件的情况下,第一网络设备根据第一请求消息,确定模型训练相关信息;When the second preset condition is met, the first network device determines model training related information according to the first request message;
上述第二预设条件指的是第一网络设备解析第一请求消息以确定模型训练相关信息的前提条件。The above-mentioned second preset condition refers to a prerequisite for the first network device to parse the first request message to determine model training related information.
其中,第二预设条件包括以下一项或者多项:Among them, the second preset condition includes one or more of the following:
(1)第一请求消息中包括模型训练指示信息;(1) The first request message includes model training instruction information;
(2)目标业务基于隐私数据运行,即隐私保护业务需求的数据是隐私数据,例如终端或3GPP内部有关于实现的隐私数据;(2) The target business operates based on privacy data, that is, the data required by the privacy protection business is private data, such as the implementation of privacy data within the terminal or 3GPP;
(3)目标业务需求的数据满足样本相同,特征不同,即隐私保护业务需求的数据具有样本相同,特征不同的特点,也就是数据性质不同,即特征不同,但是有重叠的样本ID。例如同一UE在不同域的关联数据,即同一个UE在CN中产生的MM相关数据,在RAN产生的位置数据,在第三方服务产生的业务体验数据,利用具备不同的特征的样本进行训练,可达到特征增加的建模效果。(3) The data required by the target business needs have the same sample but different characteristics, that is, the data required by the privacy protection business needs the same sample but different characteristics, that is, the nature of the data is different, that is, the characteristics are different, but there are overlapping sample IDs. For example, the associated data of the same UE in different domains, that is, the MM related data generated by the same UE in the CN, the location data generated in the RAN, and the business experience data generated by third-party services, are trained using samples with different characteristics. The modeling effect of increased features can be achieved.
在一种可能的实施方式中,模型训练相关信息,包括以下一项或者多项:In a possible implementation, the model training related information includes one or more of the following:
(1)基础模型信息,用于指示所述第一网络设备进行模型训练时使用的基础模型,对应上述实施方式一,可以是网络实体对第一请求消息进行解析,分析出完成该任务的复杂度,需要的数据等,然后从模型库中选择一个能够完成该任务的合适的基础模型;对应上述实施方式二,网络实体依据第一请求消息中的模型类型信息从模型库中选择一个模型作为训练的基础模型;(1) Basic model information, used to indicate the basic model used by the first network device when performing model training. Corresponding to the above-described first embodiment, the network entity may parse the first request message and analyze the complex steps to complete the task. degree, required data, etc., and then selects a suitable basic model from the model library that can complete the task; corresponding to the second embodiment above, the network entity selects a model from the model library as the model based on the model type information in the first request message. Basic model for training;
(2)模型配置信息,与模型类型信息匹配绑定,用于指示所述第一网络设备进行模型训练时为使用的基础模型配置的参数,也即用于指示网络实体使用某种模型进行模型训练时需要的更加具体的参数,从而为使用的基础模型定义更高层的概念,如定义基础模型的复杂性、学习能力等,模型配置信息可以包括例如针对异构神经网络的隐藏层数,针对决策树的树深度、树数量、split点等;(2) Model configuration information, matched and bound to the model type information, is used to instruct the first network device to configure parameters for the basic model used when performing model training, that is, to instruct the network entity to use a certain model for model training. More specific parameters are needed during training to define higher-level concepts for the basic model used, such as defining the complexity and learning capabilities of the basic model. The model configuration information can include, for example, the number of hidden layers for heterogeneous neural networks, and the number of hidden layers for heterogeneous neural networks. The tree depth, number of trees, split points, etc. of the decision tree;
(3)模型训练的终止条件信息,用于指示模型训练到某种程度时可以停止,例如模型收敛条件,模型的准确度或模型的迭代次数等。网络实体依据第一请求消息中的模型性能信息进行确定。(3) Termination condition information of model training, which is used to indicate that model training can be stopped when it reaches a certain level, such as model convergence conditions, model accuracy or the number of iterations of the model, etc. The network entity determines based on the model performance information in the first request message.
在一种可能的实施方式中,第一网络设备获取样本数据,包括:In a possible implementation, the first network device obtains sample data, including:
(1)第一网络设备根据第二信息,确定样本数据类型和样本数据源;(1) The first network device determines the sample data type and sample data source based on the second information;
(2)第一网络设备根据样本数据类型和样本数据源,获取样本数据; (2) The first network device obtains sample data according to the sample data type and sample data source;
其中,第二信息为第一请求消息中的样本数据要求信息,或者,第二信息为模型训练的经验信息。此外第二信息中还可以包括隐私保护等级。具体地,隐私保护等级可以与模型训练时采用的基础模型和样本特征相关,例如等级越高,样本特征提取方式越复杂,样本数量越多,对应地,训练出的模型在进行隐私保护时效果越好。The second information is the sample data request information in the first request message, or the second information is experience information of model training. In addition, the second information may also include a privacy protection level. Specifically, the privacy protection level can be related to the basic model and sample features used in model training. For example, the higher the level, the more complex the sample feature extraction method and the greater the number of samples. Correspondingly, the effect of the trained model on privacy protection is The better.
对应上述实施方式一,第一网络设备可以依照模型训练的经验信息和/或隐私保护等级确定出样本数据类型和样本数据源,该样本数据源可以是终端,也可以是核心网内的网元(各种网络功能(Network Functions,NFs)),例如可以是认证管理功能(Authentication Management Function,AMF)、会话管理功能(Sessionn Management Function,SMF)、策略控制功能(Policy Control function,PCF)等;Corresponding to the above-mentioned first embodiment, the first network device can determine the sample data type and sample data source according to the experience information of model training and/or the privacy protection level. The sample data source can be a terminal or a network element in the core network. (Various network functions (Network Functions, NFs)), such as Authentication Management Function (AMF), Session Management Function (SMF), Policy Control Function (PCF), etc.;
对应上述实施方式二,第一网络设备可以依照第一请求消息中的样本数据要求信息和/或隐私保护等级确定出样本数据类型和样本数据源,或者,第一网络设备可以依照模型训练的经验信息和/或隐私保护等级确定出样本数据类型和样本数据源。Corresponding to the second embodiment above, the first network device can determine the sample data type and sample data source according to the sample data requirement information and/or privacy protection level in the first request message, or the first network device can determine the sample data type and source according to the experience of model training. The level of information and/or privacy protection determines the sample data type and sample data source.
具体地,网络实体确定此次隐私保护业务训练的样本数据类型和数据源,例如确定本次训练需要的输入数据是终端位置(UE location),波束角度(beam angles),网络实体确定(样本数据类型=UE location information,样本源=位置业务(Location Service,LCS)网元),(样本数据类型=beam angles information,样本源=RAN)等。Specifically, the network entity determines the sample data type and data source for this privacy protection service training. For example, it determines that the input data required for this training is the terminal location (UE location), beam angles (beam angles), and the network entity determines (sample data Type = UE location information, sample source = Location Service (LCS) network element), (sample data type = beam angles information, sample source = RAN), etc.
具体地,样本收集过程,包括以下步骤:Specifically, the sample collection process includes the following steps:
(1)网络实体向各样本源下发样本收集请求,对应上述实施方式一,样本收集请求可以包括样本数据类型,对应上述实施方式二,样本收集请求可以包括隐私保护业务请求中的数据要求中的至少一项:样本类型,样本数量,样本时效,样本范围,样本搜集方式等。(1) The network entity issues a sample collection request to each sample source. Corresponding to the first embodiment, the sample collection request may include the sample data type. Corresponding to the second embodiment, the sample collection request may include the data requirements in the privacy protection service request. At least one of the following: sample type, sample quantity, sample timeliness, sample scope, sample collection method, etc.
(2)各样本源按照样本收集请求中的信息进行样本收集,例如采集UE1在每周二和周四下午18:00-20:00去健身房的次数。(2) Each sample source collects samples according to the information in the sample collection request, for example, collecting the number of times UE1 goes to the gym between 18:00 and 20:00 every Tuesday and Thursday afternoon.
(3)各样本源将样本数据进行上报,所述样本数据可能是经过样本源处理后的结果。(3) Each sample source reports sample data, which may be the result of processing by the sample source.
在一种可能的实施方式中,第一信息,包括以下一项或者多项:In a possible implementation, the first information includes one or more of the following:
(1)第一请求消息的肯定确认(Acknowledgement,ACK)信息;(1) Positive acknowledgment (ACK) information of the first request message;
(2)第一网络设备的相关信息,可以包括网络实体ID,名称信息等;(2) Relevant information of the first network device, which may include network entity ID, name information, etc.;
(3)目标模型的时效信息,包括模型生成时间和有效持续时长,用于指示目标模型的有效时间,也即该隐私保护业务对应的该训练好的模型的有效时间,超出该时间,3GPP网络再次收到相同的隐私业务请求时需要再次进行训练;(3) The timeliness information of the target model, including model generation time and validity duration, is used to indicate the validity time of the target model, that is, the validity time of the trained model corresponding to the privacy protection service. Beyond this time, the 3GPP network Training needs to be performed again when the same privacy service request is received again;
(4)目标模型的标识信息,用于标识本次隐私保护业务训练中产生的模型,即具体的模型,例如异构神经网络、决策树等。(4) The identification information of the target model is used to identify the model generated in this privacy protection business training, that is, a specific model, such as a heterogeneous neural network, decision tree, etc.
在具体实施中,上述第一信息具体可以是模型实例标识(model instance ID),可以用于标识一次模型训练的任务。In a specific implementation, the above-mentioned first information may specifically be a model instance ID (model instance ID), which may be used to identify a model training task.
在一种可能的实施方式中,方法还包括: In a possible implementation, the method further includes:
第一网络设备存储第一信息、第二网络设备的标识和目标业务的标识之间的关联关系。The first network device stores an association relationship between the first information, the identifier of the second network device, and the identifier of the target service.
第一网络设备将第一信息、第二网络设备的标识和目标业务的标识进行关联,用于之后第一网络设备为第二网络设备请求的隐私保护业务提供隐私保护数据,例如网络实体存有model instance ID 1,隐私保护业务ID 1和AF ID 1,当模型的时效性还在有效期时,AF1请求隐私保护业务ID 1时,网络实体直接使用model instance ID 1为AF 1提供隐私保护业务。The first network device associates the first information, the identifier of the second network device and the identifier of the target service, so that the first network device can later provide privacy protection data for the privacy protection service requested by the second network device. For example, the network entity has model instance ID 1, privacy protection service ID 1 and AF ID 1. When the model is still valid and AF1 requests privacy protection service ID 1, the network entity directly uses model instance ID 1 to provide privacy protection service for AF 1.
参见图3,本申请实施例提供一种业务处理方法,该方法的执行主体为第二网络设备,第二网络设备是3GPP授权的第三方网元,例如可以是AF实体。Referring to Figure 3, an embodiment of the present application provides a service processing method. The execution subject of the method is a second network device. The second network device is a third-party network element authorized by 3GPP, and may be an AF entity, for example.
方法包括:Methods include:
步骤301:第二网络设备向第一网络设备发送第一请求消息,第一请求消息用于请求对目标业务进行隐私保护;Step 301: The second network device sends a first request message to the first network device, where the first request message is used to request privacy protection for the target service;
步骤302:第二网络设备接收第一网络设备发送的第一信息,第一信息用于响应第一请求消息。Step 302: The second network device receives the first information sent by the first network device, and the first information is used to respond to the first request message.
在一种可能的实施方式中,第二网络设备向第一网络设备发送第一请求消息,包括:In a possible implementation, the second network device sends a first request message to the first network device, including:
第二网络设备通过第三网络设备向第一网络设备发送第一请求消息;The second network device sends the first request message to the first network device through the third network device;
在一种可能的实施方式中,第二网络设备接收第一网络设备发送第一信息,包括:In a possible implementation, the second network device receives the first information sent by the first network device, including:
第二网络设备通过第三网络设备接收第一网络设备发送的第一信息;The second network device receives the first information sent by the first network device through the third network device;
其中,目标业务为被授权的业务。Among them, the target business is an authorized business.
上述第三网络设备为3GPP信息暴露网元,指的是3GPP内部具备与第三方进行信息交互和授权功能的网元,可以是3GPP现有网元,也可以是新增网元,例如第三网络设备可以是NEF实体。The above-mentioned third network device is a 3GPP information exposure network element, which refers to a network element within 3GPP that has the function of information exchange and authorization with a third party. It can be an existing 3GPP network element or a newly added network element, such as a third-party network element. Network devices can be NEF entities.
上述目标业务为被授权的业务,具体指第二网络设备在向第一网络设备请求对目标业务进行隐私保护时,首先由第三网络设备判断该目标业务是否被授权,即第二网络设备可能会请求不被授权的业务,但可以通过第三网络设备进行判断过滤;具体地:第三网络设备依据预配置的隐私业务签约,对第一请求信息进行验证,判断所述第二网络设备是否被授权获取隐私业务。若判定目标业务被授权再执行后续操作。The above target service is an authorized service, which specifically means that when the second network device requests privacy protection for the target service from the first network device, the third network device first determines whether the target service is authorized, that is, the second network device may Unauthorized services will be requested, but can be judged and filtered by the third network device; specifically: the third network device verifies the first request information based on the preconfigured privacy service contract, and determines whether the second network device Authorized to obtain privacy services. If it is determined that the target service is authorized, subsequent operations will be performed.
在具体实施中,基于第二网络设备发送的第一请求消息中信息内容,可以分为两种具体的实施方式:In specific implementation, based on the information content in the first request message sent by the second network device, it can be divided into two specific implementation modes:
实施方式一:第一网络设备基于第二网络设备提供的业务需求确定模型训练相关参数,在3GPP内部收集样本数据并本地进行模型训练得到目标模型;Embodiment 1: The first network device determines parameters related to model training based on the business requirements provided by the second network device, collects sample data within 3GPP and performs model training locally to obtain the target model;
第一请求消息包括以下一项或者多项:The first request message includes one or more of the following:
(1)第二网络设备的标识,例如可以是AF ID;(1) The identification of the second network device, which may be AF ID, for example;
(2)目标业务的标识,即隐私保护业务ID,用于标识想要请求的隐私保护业务,例如隐私保护业务ID为“波束管理优化”,“用户位置推荐”,“UE健身概率预估”等;(2) The identification of the target service, that is, the privacy protection service ID, is used to identify the privacy protection service you want to request. For example, the privacy protection service ID is "beam management optimization", "user location recommendation", "UE fitness probability estimation" wait;
(3)隐私保护等级,由3GPP定义,每个等级保护的强度和暴露的内容不同,定义 原则可以是等级越高,暴露的原始数据特征越少且处理复杂度越高;具体地,隐私保护等级可以与模型训练时采用的基础模型和样本特征相关,例如等级越高,样本特征提取方式越复杂,样本数量越多,对应地,训练出的模型在进行隐私保护时效果越好;(3) Privacy protection level, defined by 3GPP. The intensity of protection and exposed content of each level are different. Definition The principle can be that the higher the level, the fewer original data features are exposed and the higher the processing complexity; specifically, the privacy protection level can be related to the basic model and sample features used in model training. For example, the higher the level, the sample feature extraction method The more complex it is, the greater the number of samples, and correspondingly, the trained model will be better at privacy protection;
(4)模型性能信息,用于指示模型训练的终止条件,包括收敛条件,迭代性能或模型准确度评价等。(4) Model performance information, used to indicate the termination conditions of model training, including convergence conditions, iteration performance or model accuracy evaluation, etc.
实施方式二:第一网络设备基于第二网络设备提供的模型训练相关参数,在3GPP内部收集样本数据并本地进行模型训练得到隐私处理方法;Implementation Mode 2: Based on the model training related parameters provided by the second network device, the first network device collects sample data within 3GPP and performs model training locally to obtain a privacy processing method;
第一请求消息包括以下一项或者多项:The first request message includes one or more of the following:
(1)第二网络设备的标识,例如可以是AF ID;(1) The identification of the second network device, which may be AF ID, for example;
(2)目标业务的标识,即隐私保护业务ID,用于标识想要请求的隐私保护业务,例如隐私保护业务ID为“波束管理优化”,“用户位置推荐”,“UE健身概率预估”等;(2) The identification of the target service, that is, the privacy protection service ID, is used to identify the privacy protection service you want to request. For example, the privacy protection service ID is "beam management optimization", "user location recommendation", "UE fitness probability estimation" wait;
(3)隐私保护等级,由3GPP定义,每个等级保护的强度和暴露的内容不同,定义原则可以是等级越高,暴露的原始数据特征越少且处理复杂度越高;(3) Privacy protection level, defined by 3GPP. The intensity of protection and exposed content of each level are different. The definition principle can be that the higher the level, the fewer the original data features are exposed and the higher the processing complexity;
(4)目标模型的相关信息,指的是隐私处理方法的相关描述,用于指定隐私处理采取的基础训练方法;(4) The relevant information of the target model refers to the relevant description of the privacy processing method, which is used to specify the basic training method adopted for privacy processing;
其中,目标模型的相关信息,包括以下一项或者多项:Among them, the relevant information of the target model includes one or more of the following:
(4.1)模型训练指示信息,用于指示第一网络设备进行模型训练,即用于指示隐私保护业务需要通过模型训练获得隐私处理方法;(4.1) Model training instruction information, used to instruct the first network device to perform model training, that is, used to indicate that privacy protection services need to obtain privacy processing methods through model training;
(4.2)模型训练配置信息,用于限定使用的基础模型等模型训练配置。(4.2) Model training configuration information, used to limit the model training configuration such as the basic model used.
具体地,模型训练配置信息,包括以下一项或者多项:Specifically, model training configuration information includes one or more of the following:
(4.2.1)模型类型信息(或者称之为模型标识信息),例如model ID等,用于指示所述第一网络设备使用的基础模型,也即用于指示网络实体使用什么基础模型进行模型训练,例如使用异构神经网络,决策树等;(4.2.1) Model type information (or model identification information), such as model ID, etc., is used to indicate the basic model used by the first network device, that is, used to indicate what basic model the network entity uses for modeling. Training, such as using heterogeneous neural networks, decision trees, etc.;
(4.2.2)模型配置信息,与模型类型信息匹配绑定,用于指示所述第一网络设备进行模型训练时为使用的基础模型配置的参数,也即用于指示网络实体使用某种模型进行模型训练时需要的更加具体的参数,从而为使用的基础模型定义更高层的概念,如定义基础模型的复杂性、学习能力等,模型配置信息可以包括例如针对异构神经网络的隐藏层数,针对决策树的树深度、树数量、split点等;(4.2.2) Model configuration information, matched and bound with model type information, is used to instruct the first network device to configure parameters for the basic model used when performing model training, that is, to instruct network entities to use a certain model. More specific parameters are needed for model training to define higher-level concepts for the basic model used, such as defining the complexity and learning capabilities of the basic model. Model configuration information can include, for example, the number of hidden layers for heterogeneous neural networks. , for the tree depth, number of trees, split points, etc. of the decision tree;
(4.2.3)模型性能信息,用于指示模型训练的终止条件,包括收敛条件,迭代性能或模型准确度评价等;(4.2.3) Model performance information, used to indicate the termination conditions of model training, including convergence conditions, iteration performance or model accuracy evaluation, etc.;
(4.2.4)样本数据要求信息,包括样本类型,样本数量,样本时效,样本范围,样本搜集方式等。(4.2.4) Sample data requirement information, including sample type, sample quantity, sample timeliness, sample range, sample collection method, etc.
在一种可能的实施方式中,第一信息,包括以下一项或者多项:In a possible implementation, the first information includes one or more of the following:
(1)第一请求消息的ACK信息;(1) ACK information of the first request message;
(2)第一网络设备的相关信息,可以包括网络实体ID,名称信息等; (2) Relevant information of the first network device, which may include network entity ID, name information, etc.;
(3)目标模型的时效信息,包括模型生成时间和有效持续时长,用于指示目标模型的有效时间,也即该隐私保护业务对应的训练好的模型的有效时间,超出该时间,3GPP网络再次收到相同的隐私业务请求时需要再次进行训练;(3) The timeliness information of the target model, including model generation time and validity duration, is used to indicate the validity time of the target model, that is, the validity time of the trained model corresponding to the privacy protection service. Beyond this time, the 3GPP network will again Training needs to be performed again when receiving the same privacy service request;
(4)目标模型的标识信息,用于标识本次隐私保护业务训练中产生的模型,即具体的模型例如异构神经网络、决策树等。(4) The identification information of the target model is used to identify the model generated in this privacy protection business training, that is, specific models such as heterogeneous neural networks, decision trees, etc.
在具体实施中,上述第一信息具体可以是模型实例标识(model instance ID),可以用于标识一次模型训练的任务。In a specific implementation, the above-mentioned first information may specifically be a model instance ID (model instance ID), which may be used to identify a model training task.
下面结合具体的实施示例对本申请的技术方案进行描述:The technical solutions of this application are described below in conjunction with specific implementation examples:
示例一:网络实体基于AF提供业务需求确定模型训练相关参数,在3GPP内部收集样本数据并本地进行模型训练得到隐私处理方法;Example 1: The network entity determines the parameters related to model training based on the business requirements provided by AF, collects sample data within 3GPP and performs model training locally to obtain the privacy processing method;
参见图4a,AF是3GPP授权的第三方网元;网络实体指的是3GPP内部具备一定分析,计算和AI训练能力的网元,可以是3GPP现有网元,也可以是新增网元,用于对3GPP内部数据进行隐私保护;3GPP信息暴露网元指的是3GPP内部具备与第三方进行信息交互和授权功能的网元,可以是3GPP现有网元,也可以是新增网元,其中一个实施例是NEF;NFs指核心网内的网元,可以是AMF、SMF、PCF等,具体是哪个网元由网络实体利用AF提供的需求信息分析得到。Referring to Figure 4a, AF is a third-party network element authorized by 3GPP; network entity refers to a network element within 3GPP that has certain analysis, computing and AI training capabilities. It can be an existing network element of 3GPP or a new network element. Used to protect the privacy of 3GPP internal data; 3GPP information exposure network elements refer to network elements within 3GPP that have the function of information interaction and authorization with third parties. They can be existing 3GPP network elements or new network elements. One example is NEF; NFs refers to network elements in the core network, which can be AMF, SMF, PCF, etc. The specific network element is analyzed by the network entity using the demand information provided by AF.
1、AF向3GPP网络实体发送隐私保护业务请求,所述请求信息中包括如下至少一种:1. The AF sends a privacy protection service request to the 3GPP network entity. The request information includes at least one of the following:
(1)AF标识(例如AF ID);(1) AF identification (such as AF ID);
(1)隐私保护业务ID,用于标识想要请求的隐私保护业务,例如隐私保护业务ID=“波束管理优化”,“用户位置推荐”,“UE健身概率预估”等。(1) Privacy protection service ID, used to identify the privacy protection service you want to request, for example, privacy protection service ID = "beam management optimization", "user location recommendation", "UE fitness probability estimation", etc.
(2)隐私保护等级,由3GPP定义,每个等级保护的强度和暴露的内容不同,原则是等级越高,暴露的原始数据特征越少且处理复杂度越高。具体地,隐私保护等级可以与模型训练时采用的基础模型和样本特征相关,例如等级越高,样本特征提取方式越复杂,样本数量越多,对应地,训练出的模型在进行隐私保护时效果越好。(2) Privacy protection level, defined by 3GPP. The intensity of protection and exposed content of each level are different. The principle is that the higher the level, the fewer the original data features are exposed and the higher the processing complexity. Specifically, the privacy protection level can be related to the basic model and sample features used in model training. For example, the higher the level, the more complex the sample feature extraction method and the greater the number of samples. Correspondingly, the effect of the trained model on privacy protection is The better.
(3)模型性能,用于指示模型训练的终止条件,包括收敛条件,迭代性能或模型准确度评价等。(3) Model performance, used to indicate the termination conditions of model training, including convergence conditions, iteration performance or model accuracy evaluation, etc.
2、NEF利用AF标识查询AF签约的隐私保护业务list,判断AF请求的隐私保护业务是否被授权。2. NEF uses the AF identifier to query the privacy protection service list contracted by AF to determine whether the privacy protection service requested by AF is authorized.
3、若AF请求的隐私保护业务被授权,NEF将隐私保护业务请求消息透明转发给网络实体。3. If the privacy protection service requested by AF is authorized, NEF transparently forwards the privacy protection service request message to the network entity.
4、网络实体对隐私保护业务请求进行解析,包括:4. The network entity parses the privacy protection service request, including:
所述网络实体确定需要进行训练获取隐私处理方法,确定需要进行训练的因素包括以下至少一项:The network entity determines that training is needed to obtain the privacy processing method, and the factors that determine the need for training include at least one of the following:
(1)隐私保护业务需求的数据是隐私数据,例如终端或3GPP内部有关于实现的隐私数据; (1) The data required by the privacy protection business is private data, such as the implementation of private data within the terminal or 3GPP;
(2)隐私保护业务需求的数据具有样本相同,特征不同的特点,例如同一UE在不同域的关联数据,即同一个UE在CN中产生的MM相关数据,在RAN产生的位置数据,在第三方服务产生的业务体验数据。(2) The data required by privacy protection services have the same sample but different characteristics. For example, the associated data of the same UE in different domains, that is, the MM related data generated by the same UE in the CN, the location data generated in the RAN, in the third Business experience data generated by third-party services.
所述网络实体确定此次隐私保护业务训练的样本数据要求和数据源,例如本次隐私保护业务ID=‘波束优化管理’,网络实体分析出本次训练需要的输入数据是波束角(beam angles),网络实体确定(样本数据类型=beam angles information,样本源=RAN)等。所述网络实体解析隐私保护业务需求,根据模型训练的经验信息和/或隐私保护等级进行确定。The network entity determines the sample data requirements and data sources for this privacy protection service training. For example, this privacy protection service ID = 'beam optimization management'. The network entity analyzes that the input data required for this training is beam angles. ), network entity determination (sample data type = beam angles information, sample source = RAN), etc. The network entity analyzes the privacy protection business requirements and determines them based on the empirical information of model training and/or the privacy protection level.
所述网络实体确定模型训练相关信息,包括以下:The network entity determines model training related information, including the following:
(1)基础模型。网络实体对隐私保护请求进行解析,分析出完成该任务的复杂度,需要的数据等,从模型库中选择一个能够完成该任务的合适的基础模型。(1)Basic model. The network entity parses the privacy protection request, analyzes the complexity of completing the task, the data required, etc., and selects an appropriate basic model from the model library that can complete the task.
(2)模型配置信息,用于指示所述第一网络设备进行模型训练时为使用的基础模型配置的参数,也即用于指定模型训练过程中更加细节的信息,从而为使用的基础模型定义更高层的概念,如定义基础模型的复杂度,学习能力,模型配置信息可以包括例如针对异构神经网络的隐藏层数,针对决策树的树深度、树数量、split点等。网络实体依据确定的基础模型和模型训练历史经验信息进行确定。(2) Model configuration information, used to indicate the parameters configured by the first network device for the basic model used when performing model training, that is, used to specify more detailed information during the model training process, thereby defining the basic model used. Higher-level concepts, such as defining the complexity of the basic model, learning capabilities, and model configuration information can include, for example, the number of hidden layers for heterogeneous neural networks, tree depth, number of trees, split points, etc. for decision trees. Network entities are determined based on the determined basic model and model training historical experience information.
(3)模型训练的终止条件,用于指示模型训练到某种程度时可以停止,例如模型收敛条件或模型的准确度。模型的迭代次数等。网络实体依据该隐私保护业务的协议(agreement)中的预配置或隐私保护业务请求中的模型性能进行确定。(3) Termination conditions for model training, used to indicate that model training can be stopped when it reaches a certain level, such as model convergence conditions or model accuracy. The number of iterations of the model, etc. The network entity determines based on the preconfiguration in the privacy protection service agreement or the model performance in the privacy protection service request.
5、样本收集过程,包括以下步骤:5. Sample collection process includes the following steps:
(1)网络实体依据步骤4中确定的样本数据要求和样本源,向各样本源下发样本收集请求。(1) The network entity issues sample collection requests to each sample source based on the sample data requirements and sample sources determined in step 4.
(2)各样本源按照样本收集请求中的信息进行样本收集,例如采集UE1在每周二和周四下午18:00-20:00去健身房的次数。(2) Each sample source collects samples according to the information in the sample collection request, for example, collecting the number of times UE1 goes to the gym between 18:00 and 20:00 every Tuesday and Thursday afternoon.
(3)各样本源将样本数据进行上报,所述样本数据可能是经过样本源处理后的结果。(3) Each sample source reports sample data, which may be the result of processing by the sample source.
6、网络实体利用收集的数据进行模型训练。6. The network entity uses the collected data to train the model.
具体地,所述网络实体依据获取的样本数据和步骤4确定的模型训练相关参数执行本地训练过程,直到训练的模型达到模型训练的终止条件。Specifically, the network entity performs a local training process based on the obtained sample data and the model training related parameters determined in step 4 until the trained model reaches the termination condition of model training.
所述网络实体为隐私保护业务训练生成一个model instance ID,用于指示本次模型训练的相关信息,包括以下至少一项信息:The network entity generates a model instance ID for privacy protection business training, which is used to indicate relevant information of this model training, including at least one of the following information:
(1)网络实体相关信息,可能包括网络实体ID,名称信息等。(1) Network entity related information, which may include network entity ID, name information, etc.
(2)模型时效性,包括模型生成时间和有效持续时长,用于指示该隐私保护业务对应的该训练好的模型的有效时间,超出该时间,3GPP网络再次收到相同的隐私业务请求时需要再次进行训练。(2) Model timeliness, including model generation time and validity duration, is used to indicate the validity time of the trained model corresponding to the privacy protection service. Beyond this time, the 3GPP network needs to receive the same privacy service request again. Training again.
(3)模型标识信息,用于标识本次隐私保护业务训练中产生的模型。(3) Model identification information, used to identify the model generated in this privacy protection business training.
所述网络实体将model instance ID,隐私保护业务ID和AF ID进行关联,用于之后网 络实体为对应的AF请求的隐私保护业务提供隐私保护数据,例如网络实体存有model instance ID 1,隐私保护业务ID 1和AF ID 1,当模型的时效性还在有效期时,AF1请求隐私保护业务ID 1时,网络实体直接使用model instance ID 1为AF 1提供隐私保护业务。The network entity associates the model instance ID, privacy protection service ID and AF ID for subsequent network use. The network entity provides privacy protection data for the privacy protection service requested by the corresponding AF. For example, the network entity has model instance ID 1, privacy protection service ID 1 and AF ID 1. When the timeliness of the model is still valid, AF1 requests privacy protection. When the service ID is 1, the network entity directly uses model instance ID 1 to provide privacy protection services for AF 1.
7、网络实体通过NEF给AF返回确认消息,其中包括model instance ID。7. The network entity returns a confirmation message to AF through NEF, including the model instance ID.
示例二:网络实体基于AF提供的模型训练相关参数,在3GPP内部收集样本数据并本地进行模型训练得到隐私处理方法;Example 2: Based on the model training related parameters provided by AF, the network entity collects sample data within 3GPP and performs model training locally to obtain the privacy processing method;
参见图4b,AF是3GPP授权的第三方网元;网络实体指的是3GPP内部具备一定分析,计算和AI训练能力的网元,可以是3GPP现有网元,也可以是新增网元,用于对3GPP内部数据进行隐私保护;3GPP信息暴露网元指的是3GPP内部具备与第三方进行信息交互和授权功能的网元,可以是3GPP现有网元,也可以是新增网元,其中一个实施例是NEF;NFs指核心网内的网元,可以是AMF、SMF、PCF等,具体是哪个网元由网络实体利用AF提供的需求信息分析得到。Referring to Figure 4b, AF is a third-party network element authorized by 3GPP; network entity refers to a network element within 3GPP that has certain analysis, computing and AI training capabilities. It can be an existing network element of 3GPP or a new network element. Used to protect the privacy of 3GPP internal data; 3GPP information exposure network elements refer to network elements within 3GPP that have the function of information interaction and authorization with third parties. They can be existing 3GPP network elements or new network elements. One example is NEF; NFs refers to network elements in the core network, which can be AMF, SMF, PCF, etc. The specific network element is analyzed by the network entity using the demand information provided by AF.
1、AF向3GPP网络实体发送隐私保护业务请求,所述请求信息中包括如下至少一种:1. The AF sends a privacy protection service request to the 3GPP network entity. The request information includes at least one of the following:
(1)AF标识(例如AF ID);(1) AF identification (such as AF ID);
(2)隐私保护业务ID,用于标识想要请求的隐私保护业务,例如隐私保护业务ID=“波束管理优化”,“用户位置推荐”,“UE健身概率预估”等。(2) Privacy protection service ID, used to identify the privacy protection service you want to request, for example, privacy protection service ID = "beam management optimization", "user location recommendation", "UE fitness probability estimation", etc.
(3)隐私保护等级,由3GPP定义,每个等级保护的强度和暴露的内容不同,原则是等级越高,暴露的原始数据特征越少且处理复杂度越高。具体地,隐私保护等级可以与模型训练时采用的基础模型和样本特征相关,例如等级越高,样本特征提取方式越复杂,样本数量越多,对应地,训练出的模型在进行隐私保护时效果越好。(3) Privacy protection level, defined by 3GPP. The intensity of protection and exposed content of each level are different. The principle is that the higher the level, the fewer the original data features are exposed and the higher the processing complexity. Specifically, the privacy protection level can be related to the basic model and sample features used in model training. For example, the higher the level, the more complex the sample feature extraction method and the greater the number of samples. Correspondingly, the effect of the trained model on privacy protection is The better.
(4)隐私保护处理方法描述,用于指定隐私处理采取的模型训练相关信息,包括如下至少一种;(4) Description of the privacy protection processing method, used to specify information related to model training adopted for privacy processing, including at least one of the following;
(4.1)模型训练指示,用于指示该隐私保护业务需要通过模型训练获得隐私保护处理方法;(4.1) Model training instructions, used to indicate that the privacy protection business needs to obtain privacy protection processing methods through model training;
(4.2)模型训练配置信息,用于限定使用的基础模型等,包括以下至少一种:(4.2) Model training configuration information, used to limit the basic models used, etc., including at least one of the following:
(4.2a)模型类型信息(或称之为模型标识信息),如model ID等,用于指示所述第一网络设备使用的基础模型,也即用于指示网络实体使用什么基础模型进行模型训练,包括异构神经网络,决策树等;(4.2a) Model type information (or called model identification information), such as model ID, etc., is used to indicate the basic model used by the first network device, that is, used to indicate what basic model the network entity uses for model training. , including heterogeneous neural networks, decision trees, etc.;
(4.2b)模型配置信息,与模型类型信息匹配绑定,用于指示所述第一网络设备进行模型训练时为使用的基础模型配置的参数,也即用于指示网络实体使用某种基础模型进行模型训练时需要的更加具体的参数,从而为使用的基础模型定义更高层的概念,如定义基础模型的复杂度,学习能力,模型配置信息可以包括例如针对异构神经网络的隐藏层数,针对决策树的树深度、树数量、split点等;(4.2b) Model configuration information, matched and bound with model type information, is used to instruct the first network device to configure parameters for the basic model used when performing model training, that is, used to instruct network entities to use a certain basic model. More specific parameters are required for model training to define higher-level concepts for the basic model used, such as defining the complexity and learning capabilities of the basic model. Model configuration information can include, for example, the number of hidden layers for heterogeneous neural networks, For the tree depth, number of trees, split points, etc. of the decision tree;
(4.2c)模型的性能(收敛条件,迭代性能或模型准确度评价等);(4.2c) Model performance (convergence conditions, iteration performance or model accuracy evaluation, etc.);
(4.2d)数据要求(包括样本类型,样本数量,样本时效,样本范围,样本搜集方式 等);(4.2d) Data requirements (including sample type, sample quantity, sample timeliness, sample range, sample collection method wait);
2、NEF利用AF标识查询AF签约的隐私保护业务list,判断AF请求的隐私保护业务是否被授权。2. NEF uses the AF identifier to query the privacy protection service list contracted by AF to determine whether the privacy protection service requested by AF is authorized.
3、若AF请求的隐私保护业务被授权,NEF将隐私保护业务请求消息透明转发给网络实体。3. If the privacy protection service requested by AF is authorized, NEF transparently forwards the privacy protection service request message to the network entity.
4、网络实体根据隐私保护业务请求,确定需要进行训练过程获取隐私处理方法。4. Based on the privacy protection service request, the network entity determines that it needs to perform a training process to obtain the privacy processing method.
所述网络实体确定需要进行训练获取隐私处理方法的因素包括以下至少一项:The factors that determine the need for training to obtain privacy processing methods by the network entity include at least one of the following:
(1)隐私保护业务请求中包括模型训练指示;(1) The privacy protection service request includes model training instructions;
(2)隐私保护业务请求的数据是隐私数据,例如终端或3GPP内部有关于实现的隐私数据;(2) The data requested by the privacy protection service is private data, such as the implementation of private data within the terminal or 3GPP;
(3)隐私保护业务请求的数据具有样本相同,特征不同的特点,例如同一UE在不同域的关联数据,即同一个UE在CN中产生的MM相关数据,在RAN产生的位置数据,在第三方服务产生的业务体验数据。(3) The data requested by the privacy protection service have the same sample but different characteristics. For example, the associated data of the same UE in different domains, that is, the MM related data generated by the same UE in the CN, the location data generated in the RAN, in the Business experience data generated by third-party services.
所述网络实体确定模型训练相关信息,包括以下:The network entity determines model training related information, including the following:
(1)基础模型,网络实体依据隐私保护请求中的模型信息或标识信息从模型库中选择一个模型作为训练的基础模型。(1) Basic model: the network entity selects a model from the model library as the basic model for training based on the model information or identification information in the privacy protection request.
(2)模型配置信息,用于指示所述第一网络设备进行模型训练时为使用的基础模型配置的参数,也即用于指定模型训练过程中更加细节的信息,从而为使用的基础模型定义更高层的概念,如定义基础模型的复杂度,学习能力,模型配置信息可以包括例如针对异构神经网络的隐藏层数,针对决策树的树深度、树数量、split点等。网络实体依据隐私保护请求中的模型配置信息进行确定。(2) Model configuration information, used to indicate the parameters configured by the first network device for the basic model used when performing model training, that is, used to specify more detailed information during the model training process, thereby defining the basic model used. Higher-level concepts, such as defining the complexity of the basic model, learning capabilities, and model configuration information can include, for example, the number of hidden layers for heterogeneous neural networks, tree depth, number of trees, split points, etc. for decision trees. The network entity is determined based on the model configuration information in the privacy protection request.
(3)模型训练的终止条件,用于指示模型训练到某种程度时可以停止,例如模型收敛条件或模型的准确度。模型的迭代次数等。网络实体依据隐私保护请求中的模型性能进行确定。(3) Termination conditions for model training, used to indicate that model training can be stopped when it reaches a certain level, such as model convergence conditions or model accuracy. The number of iterations of the model, etc. Network entities are determined based on model performance in privacy protection requests.
所述网络实体确定此次隐私保护业务训练的样本数据类型和数据源,例如确定本次训练需要的输入数据是UE location,beam angles,网络实体确定(样本数据类型=UE location information,样本源=LCS网元),(样本数据类型=beam angles information,样本源=RAN)等。确定的依据包括以下:The network entity determines the sample data type and data source for this privacy protection service training. For example, it is determined that the input data required for this training is UE location, beam angles, and the network entity determines (sample data type = UE location information, sample source = LCS network element), (sample data type = beam angles information, sample source = RAN), etc. The basis for determination includes the following:
(1)所述网络实体依据隐私保护业务请求中的数据要求推荐。(1) The network entity makes recommendations based on the data requirements in the privacy protection service request.
(2)所述网络实体依据模型训练的经验信息和/或隐私保护等级。(2) The network entity is based on the experience information and/or privacy protection level of model training.
5、样本收集过程,包括以下步骤:5. Sample collection process includes the following steps:
(1)网络实体向各样本源下发样本收集请求,包括隐私保护业务请求中的数据要求中的至少一项:样本类型,样本数量,样本时效,样本范围,样本搜集方式等。(1) The network entity issues sample collection requests to each sample source, including at least one of the data requirements in the privacy protection business request: sample type, sample quantity, sample aging, sample range, sample collection method, etc.
(2)各样本源按照样本收集请求中的信息进行样本收集,例如采集UE1在每周二和周四下午18:00-20:00去健身房的次数。 (2) Each sample source collects samples according to the information in the sample collection request, for example, collecting the number of times UE1 goes to the gym between 18:00 and 20:00 every Tuesday and Thursday afternoon.
(3)各样本源将样本数据进行上报,所述样本数据可能是经过样本源处理后的结果。(3) Each sample source reports sample data, which may be the result of processing by the sample source.
6、网络实体利用收集的数据进行模型训练。6. The network entity uses the collected data to train the model.
具体地,所述网络实体依据获取的样本数据和步骤4确定的模型训练相关参数执行本地训练过程,直到训练的模型达到模型训练的终止条件。Specifically, the network entity performs a local training process based on the obtained sample data and the model training related parameters determined in step 4 until the trained model reaches the termination condition of model training.
所述网络实体为隐私保护业务训练生成一个model instance ID,用于指示本次模型训练的相关信息,包括以下至少一项信息:The network entity generates a model instance ID for privacy protection business training, which is used to indicate relevant information of this model training, including at least one of the following information:
(1)网络实体相关信息,可能包括网络实体ID,名称信息等。(1) Network entity related information, which may include network entity ID, name information, etc.
(2)模型时效性,包括模型生成时间和有效持续时长,用于指示该隐私保护业务对应的该训练好的模型的有效时间,超出该时间,3GPP网络再次收到相同的隐私业务请求时需要再次进行训练。(2) Model timeliness, including model generation time and validity duration, is used to indicate the validity time of the trained model corresponding to the privacy protection service. Beyond this time, the 3GPP network needs to receive the same privacy service request again. Training again.
(3)模型标识信息,用于标识本次隐私保护业务训练中产生的模型。(3) Model identification information, used to identify the model generated in this privacy protection business training.
所述网络实体将model instance ID,隐私保护业务ID和AF ID进行关联,用于之后网络实体为对应的AF请求的隐私保护业务提供隐私保护数据,例如网络实体存有model instance ID 1,隐私保护业务ID 1和AF ID 1,当模型的时效性还在有效期时,AF1请求隐私保护业务ID 1时,网络实体直接使用model instance ID 1为AF 1提供隐私保护业务。The network entity associates the model instance ID, privacy protection service ID and AF ID, which is used by the network entity to provide privacy protection data for the privacy protection service requested by the corresponding AF. For example, the network entity has model instance ID 1, privacy protection Business ID 1 and AF ID 1, when the timeliness of the model is still valid, when AF1 requests the privacy protection service ID 1, the network entity directly uses the model instance ID 1 to provide the privacy protection service for AF 1.
7、网络实体通过NEF给AF返回确认消息,其中包括model instance ID。7. The network entity returns a confirmation message to AF through NEF, including the model instance ID.
本申请实施例提供的业务处理方法,执行主体可以为业务处理装置。本申请实施例中以业务处理装置执行业务处理方法为例,说明本申请实施例提供的业务处理装置。For the business processing method provided by the embodiments of this application, the execution subject may be a business processing device. In the embodiment of the present application, the business processing device executing the business processing method is taken as an example to illustrate the business processing device provided by the embodiment of the present application.
参见图5,本申请实施例提供一种业务处理装置500,具体地,该业务处理装置500可以是上述方法侧描述中的第一网络设备。Referring to Figure 5, an embodiment of the present application provides a service processing device 500. Specifically, the service processing device 500 may be the first network device in the above method side description.
业务处理装置500包括:The business processing device 500 includes:
第一接收模块501,用于接收第二网络设备发送的第一请求消息,第一请求消息用于请求对目标业务进行隐私保护;The first receiving module 501 is used to receive the first request message sent by the second network device, where the first request message is used to request privacy protection for the target service;
第一确定模块502,用于根据第一请求消息,确定模型训练相关信息;The first determination module 502 is used to determine model training related information according to the first request message;
获取模块503,用于获取样本数据;Obtain module 503, used to obtain sample data;
训练模块504,用于根据样本数据和模型训练相关信息进行模型训练,得到目标模型,目标模型用于对目标业务需求的数据进行隐私保护;The training module 504 is used to perform model training based on sample data and model training related information to obtain a target model. The target model is used to protect the privacy of data required by target business needs;
第一发送模块505,用于向第二网络设备发送第一信息,第一信息用于响应第一请求消息。The first sending module 505 is configured to send first information to the second network device, where the first information is used to respond to the first request message.
可选地,第一接收模块,用于:Optionally, the first receiving module is used for:
通过第三网络设备接收第二网络设备发送的第一请求消息;Receive the first request message sent by the second network device through the third network device;
第一发送模块,用于:The first sending module is used for:
通过第三网络设备向第二网络设备发送第一信息;Send the first information to the second network device through the third network device;
其中,目标业务为被授权的业务。Among them, the target business is an authorized business.
可选地,第一请求消息包括以下一项或者多项: Optionally, the first request message includes one or more of the following:
第二网络设备的标识;The identification of the second network device;
目标业务的标识;The identification of the target business;
隐私保护等级;Privacy protection level;
模型性能信息。Model performance information.
可选地,第一请求消息包括以下一项或者多项:Optionally, the first request message includes one or more of the following:
第二网络设备的标识;The identification of the second network device;
目标业务的标识;The identification of the target business;
隐私保护等级;Privacy protection level;
目标模型的相关信息;Information about the target model;
其中,目标模型的相关信息,包括以下一项或者多项:Among them, the relevant information of the target model includes one or more of the following:
模型训练指示信息,用于指示业务处理装置进行模型训练;Model training instruction information, used to instruct the business processing device to perform model training;
模型训练配置信息。Model training configuration information.
可选地,模型训练配置信息,包括以下一项或者多项:Optionally, model training configuration information includes one or more of the following:
模型类型信息,用于指示业务处理装置使用的基础模型;Model type information, used to indicate the basic model used by the business processing device;
模型配置信息,用于指示业务处理装置进行模型训练时为使用的基础模型配置的参数;Model configuration information, used to instruct the business processing device to configure parameters for the basic model used when performing model training;
模型性能信息;Model performance information;
样本数据要求信息。Sample data request information.
可选地,第一确定模块,用于:Optionally, the first determination module is used for:
在满足第一预设条件的情况下,根据第一请求消息,确定模型训练相关信息;When the first preset condition is met, determine model training related information according to the first request message;
其中,第一预设条件包括以下一项或者多项:Among them, the first preset condition includes one or more of the following:
目标业务基于隐私数据运行;The target business operates based on private data;
目标业务需求的数据满足样本相同,特征不同。The data meeting the target business requirements have the same samples but different characteristics.
可选地,第一确定模块,用于:Optionally, the first determination module is used for:
在满足第二预设条件的情况下,根据第一请求消息,确定模型训练相关信息;When the second preset condition is met, determine model training related information according to the first request message;
其中,第二预设条件包括以下一项或者多项:Among them, the second preset condition includes one or more of the following:
第一请求消息中包括模型训练指示信息;The first request message includes model training instruction information;
目标业务基于隐私数据运行;The target business operates based on private data;
目标业务需求的数据满足样本数据相同,特征不同。The data required by the target business meet the same sample data but have different characteristics.
可选地,模型训练相关信息,包括以下一项或者多项:Optionally, model training related information includes one or more of the following:
基础模型信息,用于指示业务处理装置进行模型训练时使用的基础模型;Basic model information, used to indicate the basic model used by the business processing device for model training;
模型配置信息,用于指示业务处理装置进行模型训练时为使用的基础模型配置的参数;Model configuration information, used to instruct the business processing device to configure parameters for the basic model used when performing model training;
模型训练的终止条件信息。Termination condition information for model training.
可选地,获取模块,用于:Optionally, get modules for:
根据第二信息,确定样本数据类型和样本数据源;Determine the sample data type and sample data source according to the second information;
根据样本数据类型和样本数据源,获取样本数据; Obtain sample data according to the sample data type and sample data source;
其中,第二信息为第一请求消息中的样本数据要求信息,或者,第二信息为模型训练的经验信息。The second information is the sample data request information in the first request message, or the second information is experience information of model training.
可选地,第一信息,包括以下一项或者多项:Optionally, the first information includes one or more of the following:
第一请求消息的ACK信息;ACK information of the first request message;
业务处理装置的相关信息;Information related to business processing devices;
目标模型的时效信息;Timeliness information of the target model;
目标模型的标识信息。Identification information of the target model.
可选地,装置还包括:Optionally, the device also includes:
存储模块,用于存储第一信息、第二网络设备的标识和目标业务的标识之间的关联关系。The storage module is used to store the association between the first information, the identifier of the second network device, and the identifier of the target service.
参见图6,本申请实施例提供一种业务处理装置600,具体地,该业务处理装置600可以是上述方法侧描述中的第二网络设备。Referring to Figure 6, an embodiment of the present application provides a service processing device 600. Specifically, the service processing device 600 may be the second network device in the above method side description.
业务处理装置600包括:The business processing device 600 includes:
第二发送模块601,用于向第一网络设备发送第一请求消息,第一请求消息用于请求对目标业务进行隐私保护;The second sending module 601 is used to send a first request message to the first network device, where the first request message is used to request privacy protection for the target service;
第二接收模块602,用于接收第一网络设备发送的第一信息,第一信息用于响应第一请求消息。The second receiving module 602 is configured to receive the first information sent by the first network device, where the first information is used to respond to the first request message.
可选地,第二发送模块,用于:Optionally, the second sending module is used for:
通过第三网络设备向第一网络设备发送第一请求消息;Send the first request message to the first network device through the third network device;
第二接收模块,用于:The second receiving module is used for:
通过第三网络设备接收第一网络设备发送的第一信息;Receive the first information sent by the first network device through the third network device;
其中,目标业务为被授权的业务。Among them, the target business is an authorized business.
可选地,第一请求消息包括以下一项或者多项:Optionally, the first request message includes one or more of the following:
业务处理装置的标识;The identification of the business processing device;
目标业务的标识;The identification of the target business;
隐私保护等级;Privacy protection level;
模型性能信息。Model performance information.
可选地,第一请求消息包括以下一项或者多项:Optionally, the first request message includes one or more of the following:
业务处理装置的标识;The identification of the business processing device;
目标业务的标识;The identification of the target business;
隐私保护等级;Privacy protection level;
目标模型的相关信息;Information about the target model;
其中,目标模型的相关信息,包括以下一项或者多项:Among them, the relevant information of the target model includes one or more of the following:
模型训练指示信息,用于指示第一网络进行模型训练;Model training instruction information, used to instruct the first network to perform model training;
模型训练配置信息。 Model training configuration information.
可选地,模型训练配置信息,包括以下一项或者多项:Optionally, model training configuration information includes one or more of the following:
模型类型信息,用于指示所述第一网络设备使用的基础模型;Model type information, used to indicate the basic model used by the first network device;
模型配置信息,用于指示所述第一网络设备进行模型训练时为使用的基础模型配置的参数;Model configuration information, used to indicate the parameters configured by the basic model used by the first network device when performing model training;
模型性能信息;Model performance information;
样本数据要求信息。Sample data request information.
可选地,第一信息,包括以下一项或者多项:Optionally, the first information includes one or more of the following:
第一请求消息的ACK信息;ACK information of the first request message;
第一网络设备的相关信息;Information related to the first network device;
目标模型的时效信息;Timeliness information of the target model;
目标模型的标识信息。Identification information of the target model.
本申请实施例中的业务处理装置可以是电子设备,例如具有操作系统的电子设备,也可以是电子设备中的部件,例如集成电路或芯片。该电子设备可以为服务器、网络附属存储器(Network Attached Storage,NAS)等,本申请实施例不作具体限定。The business processing device in the embodiment of the present application may be an electronic device, such as an electronic device with an operating system, or may be a component in the electronic device, such as an integrated circuit or chip. The electronic device may be a server, a network attached storage (Network Attached Storage, NAS), etc., which are not specifically limited in the embodiments of this application.
本申请实施例提供的业务处理装置能够实现图2至图4b的方法实施例实现的各个过程,并达到相同的技术效果,为避免重复,这里不再赘述。The business processing device provided by the embodiment of the present application can implement each process implemented by the method embodiment of Figures 2 to 4b, and achieve the same technical effect. To avoid duplication, the details will not be described here.
可选地,如图7所示,本申请实施例还提供一种通信设备700,包括处理器701和存储器702,存储器702上存储有可在所述处理器701上运行的程序或指令,例如,该通信设备700为终端时,该程序或指令被处理器701执行时实现上述业务处理方法实施例的各个步骤,且能达到相同的技术效果。该通信设备700为网络侧设备时,该程序或指令被处理器701执行时实现上述业务处理方法实施例的各个步骤,且能达到相同的技术效果,为避免重复,这里不再赘述。Optionally, as shown in Figure 7, this embodiment of the present application also provides a communication device 700, which includes a processor 701 and a memory 702. The memory 702 stores programs or instructions that can be run on the processor 701, such as , when the communication device 700 is a terminal, when the program or instruction is executed by the processor 701, each step of the above business processing method embodiment is implemented, and the same technical effect can be achieved. When the communication device 700 is a network-side device, when the program or instruction is executed by the processor 701, each step of the above business processing method embodiment is implemented, and the same technical effect can be achieved. To avoid duplication, the details are not repeated here.
具体地,本申请实施例还提供了一种网络侧设备。如图8所示,该网络侧设备800包括:处理器801、网络接口802和存储器803。其中,网络接口802例如为通用公共无线接口(common public radio interface,CPRI)。Specifically, the embodiment of the present application also provides a network side device. As shown in FIG. 8 , the network side device 800 includes: a processor 801 , a network interface 802 and a memory 803 . Among them, the network interface 802 is, for example, a common public radio interface (CPRI).
具体地,本申请实施例的网络侧设备800还包括:存储在存储器803上并可在处理器801上运行的指令或程序,处理器801调用存储器803中的指令或程序执行图5或图6所示各模块执行的方法,并达到相同的技术效果,为避免重复,故不在此赘述。Specifically, the network side device 800 in the embodiment of the present application also includes: instructions or programs stored in the memory 803 and executable on the processor 801. The processor 801 calls the instructions or programs in the memory 803 to execute Figure 5 or Figure 6 The execution methods of each module are shown and achieve the same technical effect. To avoid repetition, they will not be described in detail here.
本申请实施例还提供一种可读存储介质,所述可读存储介质上存储有程序或指令,该程序或指令被处理器执行时实现上述业务处理方法实施例的各个过程,且能达到相同的技术效果,为避免重复,这里不再赘述。Embodiments of the present application also provide a readable storage medium. Programs or instructions are stored on the readable storage medium. When the program or instructions are executed by a processor, each process of the above business processing method embodiment is implemented and the same can be achieved. The technical effects will not be repeated here to avoid repetition.
其中,所述处理器为上述实施例中所述的终端中的处理器。所述可读存储介质,包括计算机可读存储介质,如计算机只读存储器(Read-Only Memory,ROM)、随机存取存储器(Random Access Memory,RAM)、磁碟或者光盘等。Wherein, the processor is the processor in the terminal described in the above embodiment. The readable storage media includes computer-readable storage media, such as computer read-only memory (Read-Only Memory, ROM), random access memory (Random Access Memory, RAM), magnetic disks or optical disks, etc.
本申请实施例另提供了一种芯片,所述芯片包括处理器和通信接口,所述通信接口和 所述处理器耦合,所述处理器用于运行程序或指令,实现上述业务处理方法实施例的各个过程,且能达到相同的技术效果,为避免重复,这里不再赘述。An embodiment of the present application further provides a chip. The chip includes a processor and a communication interface. The communication interface and The processor is coupled, and the processor is used to run programs or instructions to implement each process of the above business processing method embodiment, and can achieve the same technical effect. To avoid duplication, the details will not be described here.
应理解,本申请实施例提到的芯片还可以称为系统级芯片,系统芯片,芯片系统或片上系统芯片等。It should be understood that the chips mentioned in the embodiments of this application may also be called system-on-chip, system-on-a-chip, system-on-chip or system-on-chip, etc.
本申请实施例另提供了一种计算机程序/程序产品,所述计算机程序/程序产品被存储在存储介质中,所述计算机程序/程序产品被至少一个处理器执行以实现上述业务处理方法实施例的各个过程,且能达到相同的技术效果,为避免重复,这里不再赘述。Embodiments of the present application further provide a computer program/program product. The computer program/program product is stored in a storage medium. The computer program/program product is executed by at least one processor to implement the above business processing method embodiment. Each process can achieve the same technical effect. To avoid repetition, we will not go into details here.
需要说明的是,在本文中,术语“包括”、“包含”或者其任何其他变体意在涵盖非排他性的包含,从而使得包括一系列要素的过程、方法、物品或者装置不仅包括那些要素,而且还包括没有明确列出的其他要素,或者是还包括为这种过程、方法、物品或者装置所固有的要素。在没有更多限制的情况下,由语句“包括一个……”限定的要素,并不排除在包括该要素的过程、方法、物品或者装置中还存在另外的相同要素。此外,需要指出的是,本申请实施方式中的方法和装置的范围不限按示出或讨论的顺序来执行功能,还可包括根据所涉及的功能按基本同时的方式或按相反的顺序来执行功能,例如,可以按不同于所描述的次序来执行所描述的方法,并且还可以添加、省去、或组合各种步骤。另外,参照某些示例所描述的特征可在其他示例中被组合。It should be noted that, in this document, the terms "comprising", "comprises" or any other variations thereof are intended to cover a non-exclusive inclusion, such that a process, method, article or device that includes a series of elements not only includes those elements, It also includes other elements not expressly listed or inherent in the process, method, article or apparatus. Without further limitation, an element defined by the statement "comprises a..." does not exclude the presence of additional identical elements in a process, method, article or apparatus that includes that element. In addition, it should be pointed out that the scope of the methods and devices in the embodiments of the present application is not limited to performing functions in the order shown or discussed, but may also include performing functions in a substantially simultaneous manner or in reverse order according to the functions involved. Functions may be performed, for example, the methods described may be performed in an order different from that described, and various steps may be added, omitted, or combined. Additionally, features described with reference to certain examples may be combined in other examples.
通过以上的实施方式的描述,本领域的技术人员可以清楚地了解到上述实施例方法可借助软件加必需的通用硬件平台的方式来实现,当然也可以通过硬件,但很多情况下前者是更佳的实施方式。基于这样的理解,本申请的技术方案本质上或者说对相关技术做出贡献的部分可以以计算机软件产品的形式体现出来,该计算机软件产品存储在一个存储介质(如ROM/RAM、磁碟、光盘)中,包括若干指令用以使得一台终端(可以是手机,计算机,服务器,空调器,或者网络设备等)执行本申请各个实施例所述的方法。Through the above description of the embodiments, those skilled in the art can clearly understand that the methods of the above embodiments can be implemented by means of software plus the necessary general hardware platform. Of course, it can also be implemented by hardware, but in many cases the former is better. implementation. Based on this understanding, the technical solution of the present application can be embodied in the form of a computer software product that is essentially or contributes to related technologies. The computer software product is stored in a storage medium (such as ROM/RAM, disk, CD), including several instructions to cause a terminal (which can be a mobile phone, computer, server, air conditioner, or network device, etc.) to execute the methods described in various embodiments of this application.
上面结合附图对本申请的实施例进行了描述,但是本申请并不局限于上述的具体实施方式,上述的具体实施方式仅仅是示意性的,而不是限制性的,本领域的普通技术人员在本申请的启示下,在不脱离本申请宗旨和权利要求所保护的范围情况下,还可做出很多形式,均属于本申请的保护之内。 The embodiments of the present application have been described above in conjunction with the accompanying drawings. However, the present application is not limited to the above-mentioned specific implementations. The above-mentioned specific implementations are only illustrative and not restrictive. Those of ordinary skill in the art will Inspired by this application, many forms can be made without departing from the purpose of this application and the scope protected by the claims, all of which fall within the protection of this application.

Claims (37)

  1. 一种业务处理方法,包括:A business processing method including:
    第一网络设备接收第二网络设备发送的第一请求消息,所述第一请求消息用于请求对目标业务进行隐私保护;The first network device receives a first request message sent by the second network device, where the first request message is used to request privacy protection for the target service;
    所述第一网络设备根据所述第一请求消息,确定模型训练相关信息;The first network device determines model training related information according to the first request message;
    所述第一网络设备获取样本数据;The first network device obtains sample data;
    所述第一网络设备根据所述样本数据和所述模型训练相关信息进行模型训练,得到目标模型,所述目标模型用于对所述目标业务需求的数据进行隐私保护;The first network device performs model training based on the sample data and the model training related information to obtain a target model, and the target model is used to protect the privacy of the data required by the target business;
    所述第一网络设备向所述第二网络设备发送第一信息,所述第一信息用于响应第一请求消息。The first network device sends first information to the second network device, where the first information is used in response to the first request message.
  2. 根据权利要求1所述的方法,其中,The method of claim 1, wherein,
    所述第一网络设备接收第二网络设备发送的第一请求消息,包括:The first network device receives the first request message sent by the second network device, including:
    所述第一网络设备通过第三网络设备接收所述第二网络设备发送的所述第一请求消息;The first network device receives the first request message sent by the second network device through a third network device;
    所述第一网络设备向所述第二网络设备发送第一信息,包括:The first network device sends first information to the second network device, including:
    所述第一网络设备通过所述第三网络设备向所述第二网络设备发送所述第一信息;The first network device sends the first information to the second network device through the third network device;
    其中,目标业务为被授权的业务。Among them, the target business is an authorized business.
  3. 根据权利要求1或2所述的方法,其中,所述第一请求消息中包括以下一项或者多项:The method according to claim 1 or 2, wherein the first request message includes one or more of the following:
    所述第二网络设备的标识;The identification of the second network device;
    所述目标业务的标识;The identification of the target business;
    隐私保护等级;Privacy protection level;
    模型性能信息。Model performance information.
  4. 根据权利要求1或2所述的方法,其中,所述第一请求消息中包括以下一项或者多项:The method according to claim 1 or 2, wherein the first request message includes one or more of the following:
    所述第二网络设备的标识;The identification of the second network device;
    所述目标业务的标识;The identification of the target business;
    隐私保护等级;Privacy protection level;
    所述目标模型的相关信息;Relevant information about the target model;
    其中,所述目标模型的相关信息,包括以下一项或者多项:Among them, the relevant information of the target model includes one or more of the following:
    模型训练指示信息,用于指示所述第一网络设备进行模型训练;Model training instruction information, used to instruct the first network device to perform model training;
    模型训练配置信息。Model training configuration information.
  5. 根据权利要求4所述的方法,其中,所述模型训练配置信息,包括以下一项或者多项: The method according to claim 4, wherein the model training configuration information includes one or more of the following:
    模型类型信息,用于指示所述第一网络设备使用的基础模型;Model type information, used to indicate the basic model used by the first network device;
    模型配置信息,用于指示所述第一网络设备进行模型训练时为使用的基础模型配置的参数;Model configuration information, used to indicate the parameters configured by the basic model used by the first network device when performing model training;
    模型性能信息;Model performance information;
    样本数据要求信息。Sample data request information.
  6. 根据权利要求3所述的方法,其中,所述第一网络设备根据所述第一请求消息,确定模型训练相关信息,包括:The method according to claim 3, wherein the first network device determines model training related information according to the first request message, including:
    在满足第一预设条件的情况下,所述第一网络设备根据所述第一请求消息,确定模型训练相关信息;When the first preset condition is met, the first network device determines model training related information according to the first request message;
    其中,所述第一预设条件包括以下一项或者多项:Wherein, the first preset condition includes one or more of the following:
    所述目标业务基于隐私数据运行;The target business operates based on private data;
    所述目标业务需求的数据满足样本相同,特征不同。The data satisfying the target business requirements have the same samples but different characteristics.
  7. 根据权利要求4所述的方法,其中,所述第一网络设备根据所述第一请求消息,确定模型训练相关信息,包括:The method according to claim 4, wherein the first network device determines model training related information according to the first request message, including:
    在满足第二预设条件的情况下,所述第一网络设备根据所述第一请求消息,确定模型训练相关信息;When the second preset condition is met, the first network device determines model training related information according to the first request message;
    其中,所述第二预设条件包括以下一项或者多项:Wherein, the second preset condition includes one or more of the following:
    所述第一请求消息中包括所述模型训练指示信息;The first request message includes the model training instruction information;
    所述目标业务基于隐私数据运行;The target business operates based on private data;
    所述目标业务需求的数据满足样本数据相同,特征不同。The data of the target business requirements meet the same sample data but have different characteristics.
  8. 根据权利要求1所述的方法,其中,所述模型训练相关信息,包括以下一项或者多项:The method according to claim 1, wherein the model training related information includes one or more of the following:
    基础模型信息,用于指示所述第一网络设备进行模型训练时使用的基础模型;Basic model information, used to indicate the basic model used by the first network device when performing model training;
    模型配置信息,用于指示所述第一网络设备进行模型训练时为使用的基础模型配置的参数;Model configuration information, used to indicate the parameters configured by the basic model used by the first network device when performing model training;
    模型训练的终止条件信息。Termination condition information for model training.
  9. 根据权利要求1至3任一项所述的方法,其中,所述第一网络设备获取样本数据,包括:The method according to any one of claims 1 to 3, wherein the first network device obtains sample data, including:
    所述第一网络设备根据第二信息,确定样本数据类型和样本数据源;The first network device determines the sample data type and sample data source based on the second information;
    所述第一网络设备根据所述样本数据类型和所述样本数据源,获取样本数据;The first network device obtains sample data according to the sample data type and the sample data source;
    其中,所述第二信息为所述第一请求消息中的样本数据要求信息,或者,所述第二信息为模型训练的经验信息。Wherein, the second information is sample data requirement information in the first request message, or the second information is experience information of model training.
  10. 根据权利要求1所述的方法,其中,所述第一信息,包括以下一项或者多项:The method according to claim 1, wherein the first information includes one or more of the following:
    所述第一请求消息的应答ACK信息;The response ACK information of the first request message;
    所述第一网络设备的相关信息; Relevant information of the first network device;
    所述目标模型的时效信息;Timeliness information of the target model;
    所述目标模型的标识信息。The identification information of the target model.
  11. 根据权利要求3或4所述的方法,其中,所述方法还包括:The method according to claim 3 or 4, wherein the method further includes:
    所述第一网络设备存储所述第一信息、所述第二网络设备的标识和所述目标业务的标识之间的关联关系。The first network device stores an association relationship between the first information, the identifier of the second network device, and the identifier of the target service.
  12. 一种业务处理方法,包括:A business processing method including:
    第二网络设备向第一网络设备发送第一请求消息,所述第一请求消息用于请求对目标业务进行隐私保护;The second network device sends a first request message to the first network device, where the first request message is used to request privacy protection for the target service;
    所述第二网络设备接收所述第一网络设备发送的第一信息,所述第一信息用于响应第一请求消息。The second network device receives the first information sent by the first network device, and the first information is used to respond to the first request message.
  13. 根据权利要求12所述的方法,其中,The method of claim 12, wherein:
    所述第二网络设备向第一网络设备发送第一请求消息,包括:The second network device sends a first request message to the first network device, including:
    所述第二网络设备通过第三网络设备向所述第一网络设备发送所述第一请求消息;The second network device sends the first request message to the first network device through a third network device;
    所述第二网络设备接收所述第一网络设备发送第一信息,包括:The second network device receives the first information sent by the first network device, including:
    所述第二网络设备通过所述第三网络设备接收所述第一网络设备发送的所述第一信息;The second network device receives the first information sent by the first network device through the third network device;
    其中,目标业务为被授权的业务。Among them, the target business is an authorized business.
  14. 根据权利要求12所述的方法,其中,所述第一请求消息中包括以下一项或者多项:The method according to claim 12, wherein the first request message includes one or more of the following:
    所述第二网络设备的标识;The identification of the second network device;
    所述目标业务的标识;The identification of the target business;
    隐私保护等级;Privacy protection level;
    模型性能信息。Model performance information.
  15. 根据权利要求12所述的方法,其中,所述第一请求消息中包括以下一项或者多项:The method according to claim 12, wherein the first request message includes one or more of the following:
    所述第二网络设备的标识;The identification of the second network device;
    所述目标业务的标识;The identification of the target business;
    隐私保护等级;Privacy protection level;
    所述目标模型的相关信息;Relevant information about the target model;
    其中,所述目标模型的相关信息,包括以下一项或者多项:Among them, the relevant information of the target model includes one or more of the following:
    模型训练指示信息,用于指示所述第一网络进行模型训练;Model training instruction information, used to instruct the first network to perform model training;
    模型训练配置信息。Model training configuration information.
  16. 根据权利要求15所述的方法,其中,所述模型训练配置信息,包括以下一项或者多项:The method according to claim 15, wherein the model training configuration information includes one or more of the following:
    模型类型信息,用于指示所述第一网络设备使用的基础模型; Model type information, used to indicate the basic model used by the first network device;
    模型配置信息,用于指示所述第一网络设备进行模型训练时为使用的基础模型配置的参数;Model configuration information, used to indicate the parameters configured by the basic model used by the first network device when performing model training;
    模型性能信息;Model performance information;
    样本数据要求信息。Sample data request information.
  17. 根据权利要求12所述的方法,其中,所述第一信息,包括以下一项或者多项:The method according to claim 12, wherein the first information includes one or more of the following:
    所述第一请求消息的ACK信息;ACK information of the first request message;
    所述第一网络设备的相关信息;Relevant information of the first network device;
    所述目标模型的时效信息;Timeliness information of the target model;
    所述目标模型的标识信息。The identification information of the target model.
  18. 一种业务处理装置,包括:A business processing device, including:
    第一接收模块,用于接收第二网络设备发送的第一请求消息,所述第一请求消息用于请求对目标业务进行隐私保护;A first receiving module configured to receive a first request message sent by the second network device, where the first request message is used to request privacy protection for the target service;
    第一确定模块,用于根据所述第一请求消息,确定模型训练相关信息;A first determination module, configured to determine model training related information according to the first request message;
    获取模块,用于获取样本数据;Obtain module, used to obtain sample data;
    训练模块,用于根据所述样本数据和所述模型训练相关信息进行模型训练,得到目标模型,所述目标模型用于对所述目标业务需求的数据进行隐私保护;A training module, configured to perform model training based on the sample data and the model training related information to obtain a target model, where the target model is used to protect the privacy of the data required by the target business;
    第一发送模块,用于向所述第二网络设备发送第一信息,所述第一信息用于响应第一请求消息。The first sending module is configured to send first information to the second network device, where the first information is used to respond to the first request message.
  19. 根据权利要求18所述的装置,其中,The device of claim 18, wherein:
    所述第一接收模块,用于:The first receiving module is used for:
    通过第三网络设备接收所述第二网络设备发送的所述第一请求消息;Receive the first request message sent by the second network device through a third network device;
    所述第一发送模块,用于:The first sending module is used for:
    通过所述第三网络设备向所述第二网络设备发送所述第一信息;Send the first information to the second network device through the third network device;
    其中,目标业务为被授权的业务。Among them, the target business is an authorized business.
  20. 根据权利要求18或19所述的装置,其中,所述第一请求消息中包括以下一项或者多项:The device according to claim 18 or 19, wherein the first request message includes one or more of the following:
    所述第二网络设备的标识;The identification of the second network device;
    所述目标业务的标识;The identification of the target business;
    隐私保护等级;Privacy protection level;
    模型性能信息。Model performance information.
  21. 根据权利要求18或19所述的装置,其中,所述第一请求消息中包括以下一项或者多项:The device according to claim 18 or 19, wherein the first request message includes one or more of the following:
    所述第二网络设备的标识;The identification of the second network device;
    所述目标业务的标识;The identification of the target business;
    隐私保护等级; Privacy protection level;
    所述目标模型的相关信息;Relevant information about the target model;
    其中,所述目标模型的相关信息,包括以下一项或者多项:Among them, the relevant information of the target model includes one or more of the following:
    模型训练指示信息,用于指示所述业务处理装置进行模型训练;Model training instruction information, used to instruct the business processing device to perform model training;
    模型训练配置信息。Model training configuration information.
  22. 根据权利要求21所述的装置,其中,所述模型训练配置信息,包括以下一项或者多项:The device according to claim 21, wherein the model training configuration information includes one or more of the following:
    模型类型信息,用于指示所述业务处理装置使用的基础模型;Model type information, used to indicate the basic model used by the business processing device;
    模型配置信息,用于指示所述业务处理装置进行模型训练时为使用的基础模型配置的参数;Model configuration information, used to indicate the parameters configured for the basic model used by the business processing device when performing model training;
    模型性能信息;Model performance information;
    样本数据要求信息。Sample data request information.
  23. 根据权利要求20所述的装置,其中,所述第一确定模块,用于:The device according to claim 20, wherein the first determining module is used for:
    在满足第一预设条件的情况下,根据所述第一请求消息,确定模型训练相关信息;When the first preset condition is met, determine model training related information according to the first request message;
    其中,所述第一预设条件包括以下一项或者多项:Wherein, the first preset condition includes one or more of the following:
    所述目标业务基于隐私数据运行;The target business operates based on private data;
    所述目标业务需求的数据满足样本相同,特征不同。The data satisfying the target business requirements have the same samples but different characteristics.
  24. 根据权利要求21所述的装置,其中,所述第一确定模块,用于:The device according to claim 21, wherein the first determining module is used for:
    在满足第二预设条件的情况下,根据所述第一请求消息,确定模型训练相关信息;When the second preset condition is met, determine model training related information according to the first request message;
    其中,所述第二预设条件包括以下一项或者多项:Wherein, the second preset condition includes one or more of the following:
    所述第一请求消息中包括所述模型训练指示信息;The first request message includes the model training instruction information;
    所述目标业务基于隐私数据运行;The target business operates based on private data;
    所述目标业务需求的数据满足样本数据相同,特征不同。The data of the target business requirements meet the same sample data but have different characteristics.
  25. 根据权利要求18所述的装置,其中,所述模型训练相关信息,包括以下一项或者多项:The device according to claim 18, wherein the model training related information includes one or more of the following:
    基础模型信息,用于指示所述业务处理装置进行模型训练时使用的基础模型;Basic model information, used to indicate the basic model used by the business processing device when performing model training;
    模型配置信息,用于指示所述业务处理装置进行模型训练时为使用的基础模型配置的参数;Model configuration information, used to indicate the parameters configured for the basic model used by the business processing device when performing model training;
    模型训练的终止条件信息。Termination condition information for model training.
  26. 根据权利要求18至20任一项所述的装置,其中,所述获取模块,用于:The device according to any one of claims 18 to 20, wherein the acquisition module is used for:
    根据第二信息,确定样本数据类型和样本数据源;Determine the sample data type and sample data source according to the second information;
    根据所述样本数据类型和所述样本数据源,获取样本数据;Obtain sample data according to the sample data type and the sample data source;
    其中,所述第二信息为所述第一请求消息中的样本数据要求信息,或者,所述第二信息为模型训练的经验信息。Wherein, the second information is sample data requirement information in the first request message, or the second information is experience information of model training.
  27. 根据权利要求18所述的装置,其中,所述第一信息,包括以下一项或者多项:The device according to claim 18, wherein the first information includes one or more of the following:
    所述第一请求消息的ACK信息; ACK information of the first request message;
    所述业务处理装置的相关信息;Relevant information about the business processing device;
    所述目标模型的时效信息;Timeliness information of the target model;
    所述目标模型的标识信息。The identification information of the target model.
  28. 根据权利要求20或21所述的装置,其中,所述装置还包括:The device according to claim 20 or 21, wherein the device further comprises:
    存储模块,用于存储所述第一信息、所述第二网络设备的标识和所述目标业务的标识之间的关联关系。A storage module configured to store an association between the first information, the identifier of the second network device, and the identifier of the target service.
  29. 一种业务处理装置,包括:A business processing device, including:
    第二发送模块,用于向第一网络设备发送第一请求消息,所述第一请求消息用于请求对目标业务进行隐私保护;The second sending module is configured to send a first request message to the first network device, where the first request message is used to request privacy protection for the target service;
    第二接收模块,用于接收所述第一网络设备发送的第一信息,所述第一信息用于响应第一请求消息。The second receiving module is configured to receive the first information sent by the first network device, where the first information is used to respond to the first request message.
  30. 根据权利要求29所述的装置,其中,The device of claim 29, wherein:
    所述第二发送模块,用于:The second sending module is used for:
    通过第三网络设备向所述第一网络设备发送所述第一请求消息;Send the first request message to the first network device through a third network device;
    所述第二接收模块,用于:The second receiving module is used for:
    通过所述第三网络设备接收所述第一网络设备发送的所述第一信息;Receive the first information sent by the first network device through the third network device;
    其中,目标业务为被的业务。Among them, the target business is the target business.
  31. 根据权利要求29所述的装置,其中,所述第一请求消息中包括以下一项或者多项:The device according to claim 29, wherein the first request message includes one or more of the following:
    所述业务处理装置的标识;The identification of the business processing device;
    所述目标业务的标识;The identification of the target business;
    隐私保护等级;Privacy protection level;
    模型性能信息。Model performance information.
  32. 根据权利要求29所述的装置,其中,所述第一请求消息中包括以下一项或者多项:The device according to claim 29, wherein the first request message includes one or more of the following:
    所述业务处理装置的标识;The identification of the business processing device;
    所述目标业务的标识;The identification of the target business;
    隐私保护等级;Privacy protection level;
    所述目标模型的相关信息;Relevant information about the target model;
    其中,所述目标模型的相关信息,包括以下一项或者多项:Among them, the relevant information of the target model includes one or more of the following:
    模型训练指示信息,用于指示所述第一网络进行模型训练;Model training instruction information, used to instruct the first network to perform model training;
    模型训练配置信息。Model training configuration information.
  33. 根据权利要求32所述的装置,其中,所述模型训练配置信息,包括以下一项或者多项:The device according to claim 32, wherein the model training configuration information includes one or more of the following:
    模型类型信息,用于指示所述第一网络设备使用的基础模型; Model type information, used to indicate the basic model used by the first network device;
    模型配置信息,用于指示所述第一网络设备进行模型训练时为使用的基础模型配置的参数;Model configuration information, used to indicate the parameters configured by the basic model used by the first network device when performing model training;
    模型性能信息;Model performance information;
    样本数据要求信息。Sample data request information.
  34. 根据权利要求29所述的装置,其中,所述第一信息,包括以下一项或者多项:The device according to claim 29, wherein the first information includes one or more of the following:
    所述第一请求消息的ACK信息;ACK information of the first request message;
    所述第一网络设备的相关信息;Relevant information of the first network device;
    所述目标模型的时效信息;Timeliness information of the target model;
    所述目标模型的标识信息。The identification information of the target model.
  35. 一种网络侧设备,包括处理器和存储器,其中,所述存储器存储可在所述处理器上运行的程序或指令,所述程序或指令被所述处理器执行时实现如权利要求1至11任一项所述的业务处理方法的步骤。A network-side device, including a processor and a memory, wherein the memory stores programs or instructions that can be run on the processor, and when the programs or instructions are executed by the processor, claims 1 to 11 are implemented The steps of the business processing method described in any one of the above.
  36. 一种网络侧设备,包括处理器和存储器,其中,所述存储器存储可在所述处理器上运行的程序或指令,所述程序或指令被所述处理器执行时实现如权利要求12至17任一项所述的业务处理方法的步骤。A network side device, including a processor and a memory, wherein the memory stores programs or instructions that can be run on the processor, and when the programs or instructions are executed by the processor, claims 12 to 17 are implemented The steps of the business processing method described in any one of the above.
  37. 一种可读存储介质,所述可读存储介质上存储程序或指令,其中,所述程序或指令被处理器执行时实现如权利要求1至11任一项所述的业务处理方法的步骤,或者实现如权利要求12至17任一项所述的业务处理方法的步骤。 A readable storage medium storing programs or instructions on the readable storage medium, wherein when the programs or instructions are executed by a processor, the steps of the business processing method as described in any one of claims 1 to 11 are implemented, Or implement the steps of the business processing method as described in any one of claims 12 to 17.
PCT/CN2023/092471 2022-05-13 2023-05-06 Service processing method, and device and readable storage medium WO2023217026A1 (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN202210523618.0A CN117119442A (en) 2022-05-13 2022-05-13 Service processing method, device and readable storage medium
CN202210523618.0 2022-05-13

Publications (1)

Publication Number Publication Date
WO2023217026A1 true WO2023217026A1 (en) 2023-11-16

Family

ID=88729702

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2023/092471 WO2023217026A1 (en) 2022-05-13 2023-05-06 Service processing method, and device and readable storage medium

Country Status (2)

Country Link
CN (1) CN117119442A (en)
WO (1) WO2023217026A1 (en)

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111782637A (en) * 2020-07-03 2020-10-16 支付宝(杭州)信息技术有限公司 Model construction method, device and equipment
US20210014141A1 (en) * 2019-07-12 2021-01-14 Verizon Patent And Licensing Inc. System and method of closed loop analytics for network automation
CN112818390A (en) * 2021-01-26 2021-05-18 支付宝(杭州)信息技术有限公司 Data information publishing method, device and equipment based on privacy protection
CN113435585A (en) * 2021-07-15 2021-09-24 支付宝(杭州)信息技术有限公司 Service processing method, device and equipment

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20210014141A1 (en) * 2019-07-12 2021-01-14 Verizon Patent And Licensing Inc. System and method of closed loop analytics for network automation
CN111782637A (en) * 2020-07-03 2020-10-16 支付宝(杭州)信息技术有限公司 Model construction method, device and equipment
CN112818390A (en) * 2021-01-26 2021-05-18 支付宝(杭州)信息技术有限公司 Data information publishing method, device and equipment based on privacy protection
CN113435585A (en) * 2021-07-15 2021-09-24 支付宝(杭州)信息技术有限公司 Service processing method, device and equipment

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
"3rd Generation Partnership Project; Technical Specification Group Services and System Aspects; Study on security aspects of enablers for Network Automation (eNA) for the 5G system (5GS) Phase 2; (Release 17)", 3GPP STANDARD; TECHNICAL REPORT; 3GPP TR 33.866, 3RD GENERATION PARTNERSHIP PROJECT (3GPP), MOBILE COMPETENCE CENTRE ; 650, ROUTE DES LUCIOLES ; F-06921 SOPHIA-ANTIPOLIS CEDEX ; FRANCE, no. V0.8.0, 19 November 2021 (2021-11-19), Mobile Competence Centre ; 650, route des Lucioles ; F-06921 Sophia-Antipolis Cedex ; France, pages 1 - 50, XP052082902 *

Also Published As

Publication number Publication date
CN117119442A (en) 2023-11-24

Similar Documents

Publication Publication Date Title
US11582589B2 (en) Wireless network policy manager for a service mesh
CN109818868B (en) Method, device, equipment and storage medium for realizing edge network capability opening
WO2022148254A1 (en) User information analysis result feedback method and device thereof
US20240089343A1 (en) Service layer-based methods to enable efficient analytics of iot data
US11838311B2 (en) Systems and methods for automated quantitative risk and threat calculation and remediation
WO2022141295A1 (en) Communication method and apparatus
US20230308930A1 (en) Communication method and apparatus
WO2023217026A1 (en) Service processing method, and device and readable storage medium
WO2023231939A1 (en) Service processing method and apparatus, network device and storage medium
WO2023216961A1 (en) Privacy protection information processing method and apparatus, and communication device
WO2023185725A1 (en) Data acquisition method and apparatus, and network-side device
US20220124008A1 (en) Automated Service Layer Message Flow Management In A Communications Network
WO2023216960A1 (en) Data processing method and apparatus, core network node, electronic device, and storage medium
WO2024032588A1 (en) User will verification method and apparatus, and network-side device
WO2023179709A1 (en) Information processing method and apparatus, communication device, and readable storage medium
WO2023207980A1 (en) Model information acquisition method and apparatus, model information sending method and apparatus, and node and storage medium
WO2024078400A1 (en) Model request method and apparatus, communication device, and readable storage medium
WO2024045970A1 (en) Route selection policy execution result processing methods, apparatus and device
US20230409734A1 (en) Systems and methods for secure aggregating and reporting of monitored data
WO2023213288A1 (en) Model acquisition method and communication device
WO2024078589A1 (en) Information reporting method and apparatus, communication device, and storage medium
WO2023241503A1 (en) Privacy protection method and apparatus, and terminal, node and storage medium
EP3912329B1 (en) Automated service layer message flow management in a communications network
CN116866886A (en) Data acquisition method and communication equipment
CN116828444A (en) Information acquisition method and device

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 23802798

Country of ref document: EP

Kind code of ref document: A1