WO2024012356A1 - Device data path management and control method, device, terminal, and network side device - Google Patents

Device data path management and control method, device, terminal, and network side device Download PDF

Info

Publication number
WO2024012356A1
WO2024012356A1 PCT/CN2023/106235 CN2023106235W WO2024012356A1 WO 2024012356 A1 WO2024012356 A1 WO 2024012356A1 CN 2023106235 W CN2023106235 W CN 2023106235W WO 2024012356 A1 WO2024012356 A1 WO 2024012356A1
Authority
WO
WIPO (PCT)
Prior art keywords
information
rule
data
relay
forwarding
Prior art date
Application number
PCT/CN2023/106235
Other languages
French (fr)
Chinese (zh)
Inventor
谢振华
Original Assignee
维沃移动通信有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 维沃移动通信有限公司 filed Critical 维沃移动通信有限公司
Publication of WO2024012356A1 publication Critical patent/WO2024012356A1/en

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/08Configuration management of networks or network elements
    • H04L41/0803Configuration setting
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/08Configuration management of networks or network elements
    • H04L41/0893Assignment of logical groups to network elements
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/12Discovery or management of network topologies
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L45/00Routing or path finding of packets in data switching networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L45/00Routing or path finding of packets in data switching networks
    • H04L45/14Routing performance; Theoretical aspects
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/20Network architectures or network communication protocols for network security for managing network security; network security policies in general
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/40Network security protocols
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W40/00Communication routing or communication path finding
    • H04W40/24Connectivity information management, e.g. connectivity discovery or connectivity update

Definitions

  • This application belongs to the field of mobile communication technology, and specifically relates to a device data path management and control method, equipment, terminals and network side equipment.
  • Embodiments of the present application provide a device data path management and control method, device, terminal and network side device, which can solve the problem of security risks in the opened path.
  • a device data path management and control method is provided, which is applied to the first network function.
  • the method includes:
  • the first network function receives first information from the second network function, the first information including rule information and rule event information;
  • the first network function performs at least one of the following:
  • the relay rule information is used to instruct the first device to forward the rules of data between the mobile network and the third device
  • the forwarding rule information is used to instruct the third network function to forward the data between the mobile network and the data network.
  • rules for data the rule event information is used to indicate the valid or invalid condition of the rule information
  • the relay rule event information is used to indicate the valid or invalid condition of the relay rule information
  • the third device It is a device that receives data from the mobile network side or sends data to the mobile network side through the first device.
  • a device data path management and control device including:
  • a first transmission module configured to receive first information from the second network function, where the first information includes rule information and rule event information;
  • a first execution module configured to execute at least one of the following according to the first information:
  • the relay rule information is used to instruct the first device to forward the rules of data between the mobile network and the third device
  • the forwarding rule information is used to instruct the third network function to forward the data between the mobile network and the data network.
  • rules for data the rule event information is used to indicate the valid or invalid condition of the rule information
  • the relay rule event information is used to indicate the valid or invalid condition of the relay rule information
  • the third device It is a device that receives data from the mobile network side or sends data to the mobile network side through the first device.
  • a device data path management and control method applied to the first device, and the method includes:
  • the first device receives second information from the mobile network side, where the second information includes at least one of the following: relay rule information and relay rule event information; termination of relay indication;
  • the first device performs at least one of the following:
  • the third device is a device that receives data from the mobile network side or sends data to the mobile network side through the first device.
  • a device data path management and control device including:
  • the second transmission module is configured to receive second information from the mobile network side, where the second information includes at least one of the following: relay rule information and relay rule event information; termination of relay indication;
  • a second execution module configured to execute at least one of the following according to the second information:
  • the third device Based on the termination relay indication, terminate the forwarding of data between the mobile network and the third device; wherein the third device receives data from the mobile network side or sends data to the mobile network side through the device access management and control device. device of.
  • a device data path management and control method is provided, which is applied to the second network function.
  • the method includes:
  • the second network function sends first information to the first network function, where the first information includes rule information and rule event information.
  • a device data path management and control device including:
  • the third execution module is used to obtain the first information
  • the third transmission module is configured to send first information to the first network function, where the first information includes rule information and rule event information.
  • the seventh aspect provides a device data path management and control method applied to a third device.
  • the method includes:
  • the third device sends third information to the first device or the second device, where the third information includes rule event information for data forwarding;
  • the rule event information is used to indicate relevant information for determining whether the data forwarding is valid or invalid;
  • the third device is a device that receives data from the mobile network side through the first device or sends data to the mobile network side. .
  • a device data path management and control device including:
  • the fourth execution module is used to obtain the third information
  • a fourth transmission module configured to send the third information to the first device or the second device, where the third information includes rule event information for data forwarding;
  • the rule event information is used to indicate relevant information for determining whether the data forwarding is valid or invalid; the device access management and control device is to receive data from the mobile network side through the first device or send data to the mobile network side. device of.
  • a device data path management and control method is provided, applied to the second device, and the method includes:
  • the second device sends fourth information to the second network function, where the fourth information includes rule event information for data forwarding; the rule event information is used to indicate relevant information for determining whether the data forwarding is valid or invalid.
  • a device data path management and control device including:
  • the fifth execution module is used to obtain the fourth information
  • the fifth transmission module is configured to send fourth information to the second network function, where the fourth information includes rule event information for data forwarding; the rule event information is used to indicate relevant information for determining whether the data forwarding is valid or invalid.
  • a terminal in an eleventh aspect, includes a processor and a memory.
  • the memory stores programs or instructions that can be run on the processor.
  • the program or instructions When executed by the processor, the following is implemented: The steps of the method described in the third, seventh or ninth aspect.
  • a terminal including a processor and a communication interface, wherein the processor is configured to perform at least one of the following according to the second information: forwarding based on the relay rule information Data between the mobile network and the third device; Validating or invalidating the relay rule information based on the relay rule event information; Terminating forwarding of data between the mobile network and the third device based on the termination relay indication , the communication interface is used to receive second information from the mobile network side, where the second information includes at least one of the following: relay rule information and relay rule event information; and a termination relay indication.
  • a network side device in a thirteenth aspect, includes a processor and a memory.
  • the memory stores programs or instructions that can be run on the processor.
  • the program or instructions are used by the processor. When executed, the steps of the method described in the first aspect or the fifth aspect are implemented.
  • a device data path management and control system including: a first device, a second device, a third device, a first network function and a second network function.
  • the first network function can be used to perform the following steps: The steps of the device data path management and control method described in one aspect, the first device can be used to perform the steps of the device data path management and control method described in the third aspect, and the second network function can be used to perform the steps of the device data path management and control method described in the fifth aspect.
  • the third device can be used to perform the steps of the device data path management and control method described in the seventh aspect
  • the second device can be used to perform the device data path management and control method described in the ninth aspect. Steps of the path management method.
  • a readable storage medium is provided. Programs or instructions are stored on the readable storage medium. When the programs or instructions are executed by a processor, the steps of the method described in the first aspect are implemented, or the steps of the method are implemented. The steps of the method described in the third aspect, or the steps of implementing the method described in the fifth aspect, or the steps of the method described in the seventh aspect, or the steps of the method described in the ninth aspect.
  • a chip in a sixteenth aspect, includes a processor and a communication interface.
  • the communication interface is coupled to the processor.
  • the processor is used to run programs or instructions to implement the method described in the first aspect.
  • a computer program/program product is provided, the computer program/program product is stored in a storage medium, and the computer program/program product is executed by at least one processor to implement the first aspect
  • the first information includes rule information and rule event information; and performing at least one of the following according to the first information: based on the rule information, sending relay rule information to the first device; based on the rule event information, sending relay rule event information to the first device; based on the rule information, forwarding the rule information to a third network function configuration; based on the rule event information , valid or invalid configuration of the forwarding rule information, so that the data path between the third device and the mobile network can be effectively configured according to the rule event information. Effective management and control to improve the security of mobile networks.
  • Figure 1 is a schematic structural diagram of a wireless communication system applicable to the embodiment of the present application.
  • Figure 2 is a schematic structural diagram of a device data path management system provided by an embodiment of the present application.
  • Figure 3 is a schematic flow chart of a device data path management and control method provided by an embodiment of the present application.
  • Figure 4 is a schematic diagram of the signaling flow of a device data path management and control method provided by an embodiment of the present application
  • Figure 5 is a schematic structural diagram of a device data path management and control device provided by an embodiment of the present application.
  • FIG. 6 is a schematic flowchart of another device data path management and control method provided by an embodiment of the present application.
  • Figure 7 is a schematic structural diagram of another device data path management and control device provided by an embodiment of the present application.
  • Figure 8 is a schematic flow chart of another device data path management and control method provided by an embodiment of the present application.
  • Figure 9 is a schematic structural diagram of another device data path management and control device provided by an embodiment of the present application.
  • Figure 10 is a schematic flowchart of another device data path management and control method provided by an embodiment of the present application.
  • Figure 11 is a schematic structural diagram of another device data path management and control device provided by an embodiment of the present application.
  • Figure 12 is a schematic flow chart of another device data path management and control method provided by an embodiment of the present application.
  • Figure 13 is a schematic structural diagram of another device data path management and control device provided by an embodiment of the present application.
  • Figure 14 is a schematic structural diagram of a communication device provided by an embodiment of the present application.
  • Figure 15 is a schematic structural diagram of a terminal that implements an embodiment of the present application.
  • Figure 16 is a schematic structural diagram of a network side device that implements an embodiment of the present application.
  • first, second, etc. in the description and claims of this application are used to distinguish similar objects and are not used to describe a specific order or sequence. It is to be understood that the terms so used are interchangeable under appropriate circumstances so that the embodiments of the present application can be practiced in sequences other than those illustrated or described herein, and that "first" and “second” are distinguished objects It is usually one type, and the number of objects is not limited.
  • the first object can be one or multiple.
  • “and/or” means at least one of the connected objects, and the character “/” generally means that the related objects are in an "or” relationship.
  • LTE Long Term Evolution
  • LTE-Advanced, LTE-A Long Term Evolution
  • LTE-A Long Term Evolution
  • CDMA Code Division Multiple Access
  • TDMA Time Division Multiple Access
  • FDMA Frequency Division Multiple Access
  • OFDMA Orthogonal Frequency Division Multiple Access
  • SC-FDMA Single-carrier Frequency Division Multiple Access
  • NR New Radio
  • FIG. 1 shows a block diagram of a wireless communication system to which embodiments of the present application are applicable.
  • the wireless communication system includes a terminal 11 and a network side device 12.
  • the terminal 11 may be a mobile phone, a tablet computer (Tablet Personal Computer), a laptop computer (Laptop Computer), or a notebook computer, a personal digital assistant (Personal Digital Assistant, PDA), a palmtop computer, a netbook, or a super mobile personal computer.
  • Tablet Personal Computer Tablet Personal Computer
  • laptop computer laptop computer
  • PDA Personal Digital Assistant
  • PDA Personal Digital Assistant
  • UMPC ultra-mobile personal computer
  • UMPC mobile Internet device
  • MID mobile Internet Device
  • AR augmented reality
  • VR virtual reality
  • robots wearable devices
  • WUE Vehicle User Equipment
  • PUE Pedestrian User Equipment
  • smart home home equipment with wireless communication functions, such as refrigerators, TVs, washing machines or furniture, etc.
  • game consoles personal computers (personal computer, PC), teller machine or self-service machine and other terminal-side devices.
  • Wearable devices include: smart watches, smart bracelets, smart headphones, smart glasses, smart jewelry (smart bracelets, smart bracelets, smart rings, smart necklaces, smart anklets) bracelets, smart anklets, etc.), smart wristbands, smart clothing, etc.
  • the network side device 12 may include an access network device or a core network device, where the access network device 12 may also be called a radio access network device, a radio access network (Radio Access Network, RAN), a radio access network function or Wireless access network unit.
  • the access network device 12 may include a base station, a Wireless Local Area Network (WLAN) access point or a WiFi node, etc.
  • WLAN Wireless Local Area Network
  • the base station may be called a Node B, an evolved Node B (eNB), an access point, Base Transceiver Station (BTS), radio base station, radio transceiver, Basic Service Set (BSS), Extended Service Set (ESS), home B-node, home evolved B-node , sending and receiving points (Transmitting Receiving Point (TRP) or some other appropriate terminology in the field, as long as the same technical effect is achieved, the base station is not limited to specific technical terms. It should be noted that in the embodiment of this application, only TRP in the NR system is used. The base station is taken as an example for introduction, and the specific type of base station is not limited.
  • TRP Transmitting Receiving Point
  • Core network equipment may include but is not limited to at least one of the following: core network nodes, core network functions, mobility management entities (Mobility Management Entity, MME), access mobility management functions (Access and Mobility Management Function, AMF), session management functions (Session Management Function, SMF), User Plane Function (UPF), Policy Control Function (PCF), Policy and Charging Rules Function (PCRF), Edge Application Service Discovery function (Edge Application Server Discovery Function, EASDF), Unified Data Management (UDM), Unified Data Repository (UDR), Home Subscriber Server (HSS), centralized network configuration ( Centralized network configuration (CNC), Network Repository Function (NRF), Network Exposure Function (NEF), Local NEF (Local NEF, or L-NEF), Binding Support Function (Binding Support Function, BSF), application function (Application Function, AF), etc.
  • MME mobility management entities
  • AMF Access and Mobility Management Function
  • SMF Session Management Function
  • UPF User Plane Function
  • PCF Policy Control Function
  • the embodiment of the present application provides a device data path management and control method.
  • the execution subject of the method is the first network function.
  • the method can be performed by software or hardware installed on the first network function. to execute.
  • the method includes the following steps.
  • the first network function receives first information from the second network function, where the first information includes rule information and rule event information.
  • the device data path management and control system of the embodiment of the present application improves network security by managing and controlling the data path of the third device 203 (which may also be called an access device) accessing the mobile network.
  • the data network where the third device 203 is located may be Personal IoT Networks (PIN), and the third device 203 may be a Personal IoT Device (PIN Element, PINE), the data network also includes a first device 201 and a second device 202.
  • PIN Personal IoT Networks
  • PINE Personal IoT Device
  • the first device 201 is a personal Internet of Things device (PIN Elements with Gateway Capability, PEGC) connected to the mobile network and has a gateway function
  • the second device 202 is a personal Internet of Things device (PIN Elements with Management Capability, PEMC) with a management function for managing a third device.
  • the mobile network mainly includes: a first network function 211, a second network function 212 and a third network function 213, where the first network function 211 may be a session management function (Session Management Function, SMF) in the mobile network.
  • the second network function 212 may be a personal IoT management function (PINMF) connected to the network where the third device is located, and the second network function 212 may also be a network exposure function (NEF).
  • a policy control function Policy Control Function, PCF
  • the third network function 213 may be a user plane function (User Plane Function, UPF) used to perform routing and forwarding of user plane data packets.
  • the rule information is used to indicate the relevant data transmission rules of the data path for the third device to access the mobile network.
  • the rule information may include relay rule information and forwarding rule information.
  • the relay rule information is used to indicate the third device.
  • a device forwards a rule for data between a mobile network and a third device, and the forwarding rule information is used to instruct the third network function to forward a rule for data between a mobile network and a data network.
  • the rule information can be specifically expressed as routing information (Routing Information, Routing Info), and the relay rule information can be specifically expressed as device and network routing information (Device to Network Routing Information, D2N Routing). Info), the forwarding rule information may be specifically expressed as inter-network routing information (Network Routing Information, Network Routing Info).
  • the relay rule information and the forwarding rule information include at least one of the following:
  • Uplink data filtering rules specifically expressed as uplink data filter (Uplink packet filter, UL packet filter);
  • Downlink data filtering rules specifically expressed as downlink data filters (Downlink packet filters, DL packet filter);
  • the rule event information is used to indicate the valid or invalid condition of the rule information. Based on the rule event information, the relay rule event information corresponding to the relay rule information and the forwarding rule event information corresponding to the forwarding rule information can be determined respectively. , the relay rule event information is used to indicate a valid or invalid condition of the relay rule information, and the forwarding rule event information is used to indicate a valid or invalid condition of the forwarding rule information.
  • the rule event information includes at least one of the following corresponding to the rule information:
  • Duration information (Duration), valid time information, invalid time information, illegal access instructions, and number of illegal accesses.
  • the relay rule event information includes at least one of the following corresponding to the relay rule information:
  • Duration information valid time information, invalid time information.
  • the forwarding rule event is configured to include at least one of the following corresponding to the forwarding rule information:
  • Duration information valid time information, invalid time information, illegal access instructions, and number of illegal accesses.
  • the configuration of valid or invalid forwarding rule information based on the rule event information may include:
  • Forwarding rule event information is determined based on the rule event information, and based on the forwarding rule event information, valid or invalid forwarding rule information is configured.
  • the content of the forwarding rule event information may be equal to the content of the rule event information, that is, the first network function may directly regard the rule event information as the forwarding rule event information to determine the valid or invalid conditions for forwarding the rule information.
  • rule event information is used as an example to determine the valid or invalid conditions for forwarding rule information.
  • the duration information may be used to indicate the validity period of the corresponding rule information, relay rule information or forwarding rule information.
  • the validity period is not necessarily the absolute period of the duration information rule, and may be greater than or less than the duration information.
  • the time range of the rule may also deviate from the time range of the duration information rule. For example, the starting time of the validity period is within the time range of the duration information rule, and the end time of the validity period is within the time range of the duration information rule. outside the time range.
  • There can be various ways to determine whether the validity period is valid For example, you can set a timer to determine that the validity period is valid if the timer does not expire, and determine that the validity period has expired if the timer times out.
  • the valid time information may be used to indicate the valid time or time range of the corresponding rule information, relay rule information or forwarding rule information.
  • the invalid time information may be used to indicate the time or time range when the corresponding rule information, relay rule information or forwarding rule information is invalid.
  • the violation access indication is used to indicate that when data that does not match the rule information or the forwarding rule information is detected, the rule information or the forwarding rule information is invalid.
  • the number of illegal accesses is used to indicate that when data that does not match the rule information or forwarding rule information is detected and exceeds the number of illegal accesses, the rule information or the forwarding rule information is invalidated.
  • the third device may send a data forwarding request to the second network function through the second device and/or the third device.
  • the third device may send third information to the first device or the second device, and the third information may include rule event information for data forwarding; wherein the rule event information is used to indicate that it is determined that the data forwarding is valid. or invalid information.
  • the second device sends fourth information to the second network function according to the third information, where the fourth information includes rule event information for data forwarding.
  • the second network function sends the first information to the first network function according to the fourth information.
  • rule event information can be determined in various ways.
  • the rule event information can be provided by the first device; in another implementation, the rule event information It may be provided by the second device or determined or adjusted based on the rule event information sent by the first device; in another implementation manner, the rule event information may also be provided by the second network Functionality is determined based on local policy and/or rule event information sent by the second device.
  • the first network function performs at least one of the following:
  • the third device is a device that receives data from the mobile network side or sends data to the mobile network side through the first device.
  • the first device After the first device obtains the relay rule information and the relay rule event information from the mobile network side, that is, from the first network function, it may perform at least one of the following:
  • the relay rule information is valid or invalid.
  • the valid or invalid relay rule information based on the relay rule event information includes at least one of the following:
  • the first device If the validity period determined based on the duration information is valid, the first device enables the relay rule information;
  • the first device deactivates the relay rule information.
  • the valid or invalid relay rule information based on the relay rule event information includes:
  • the first device When the current time reaches the time or time range determined by the valid time information, the first device enables the relay rule information.
  • validating or invalidating the relay rule information based on the relay rule event information includes:
  • the first device deactivates the relay rule information.
  • the configuration of the forwarding rule information can be valid or invalid based on the relevant information included in the rule event information.
  • the configuration of valid or invalid forwarding rule information based on the rule event information includes at least one of the following:
  • the first network function indicates to the third network function that the forwarding rule information is valid;
  • the first network function indicates to the third network function that the forwarding rule information is invalid, for example, instructs to delete or invalidates the forwarding rule information.
  • the configuration of valid or invalid forwarding rule information based on the rule event information includes:
  • the first network function When the current time reaches the time or time range determined by the valid time information, the first network function indicates to the third network function that the forwarding rule information is valid.
  • the configuration of valid or invalid forwarding rule information based on the rule event information includes:
  • the first network function When the current time reaches the time or time range determined by the invalid time information, the first network function indicates to the third network function that the forwarding rule information is invalid.
  • the configuration of valid or invalid forwarding rule information based on the rule event information includes:
  • the first network function indicates to the third network function that the forwarding rule information is invalid.
  • the configuration of valid or invalid forwarding rule information based on the rule event information includes:
  • the first network function When it is detected that data that does not match the rule information exceeds the number of illegal accesses, the first network function indicates to the third network function that the forwarding rule information is invalid.
  • the method when the rule event information includes a violation access indication and/or a violation access count, when data that does not match the rule information is detected or when data that does not match the rule information is detected. In the case where the data exceeds the number of illegal accesses, the method also includes:
  • the first network function sends a termination relay indication to the first device, where the termination relay indication is used to instruct the first device to terminate forwarding data between the mobile network and the third device.
  • the first device After receiving the relay termination indication, the first device terminates forwarding data between the mobile network and the third device based on the relay termination indication.
  • this application implements a signaling process of a device data path management and control method:
  • A1.PINE sends third information to PEGC or PEMC, which may include:
  • PINE first establishes a direct connection with PEGC and sends a remote provisioning request (Remote Provisioning Request) carrying third information to PEGC.
  • the third information may include: personal Internet of Things identifier (PIN Identifier, PIN ID), PINE identifier (PINE ID) and rule event information.
  • PIN ID personal Internet of Things identifier
  • PINE ID PINE identifier
  • Rule event information takes Duration as an example
  • PEGC can directly send a Remote Provisioning Request to PEMC; PEGC can also first send a PEMC notification message (PEMC Notification) to PINMF.
  • PEMC Notification includes a PEGC identification (PEGC ID) and a Remote Provisioning Request, and then PINMF sends it to the PEMC.
  • PEMC Notification includes a PEGC identification (PEGC ID) and a Remote Provisioning Request, and then PINMF sends it to the PEMC.
  • PEMC sends a Remote Provisioning Request carrying fourth information to PINMF.
  • the fourth information may include PIN ID, PINE ID, PEMC ID (PEMC ID), PEGC ID and Duration; wherein, the PEMC may be adjusted from step A1 Duration received.
  • A3-A4.PINMF sends the first information to SMF, which may include:
  • the PINMF sends a Remote Provisioning Request carrying the first information to the PCF through the N5 interaction protocol or NEF.
  • the first information may include: optional User Permanent Identifier (Subscription Permanent Identifier, SUPI) or Generic Public User Identifier (Generic Public Subscription Identifier) , GPSI), terminal address (UE address), optional data network name (Data Network Name, DNN) or slice related information (such as Single Network Slice Selection Assistance Information (S-NSSAI), network Slice identification (Network Slice Instance, NSI)), PIN ID, PINE ID, device and inter-network routing information (Device to Network Routing Information, D2N Routing Info), uplink packet filters (UL Packet filters), downlink packet filters ( DL Packet filters) and Duration.
  • PINMF can determine Duration based on local policies.
  • the D2N Routing Info and DL Packet filters can be generated based on PINE;
  • PCF sends a Remote Provisioning Request carrying the first information to SMF.
  • A5.SMF interacts with UPF and configures forwarding rule information to UPF.
  • A6.SMF and PEGC perform Protocol Data Unit Session Modification (PDU Session Modification), and send second information to PEGC through the N1 message.
  • the second information may include PIN ID, PINE ID, and D2N Routing Info. and Duration.
  • A7.-A10 SMF sends feedback information to PCF
  • PCF sends feedback information to PINMF
  • PINMF sends feedback information to PEMC
  • PEMC sends feedback information to PINE
  • PINE can interact with the provision server through the mobile network, and the provision server can be managed by a 3rd party device or processor.
  • the embodiments of the present application receive first information from the second network function, where the first information includes rule information and rule event information; and perform at least one of the following based on the first information: based on The rule information sends relay rule information to the first device; based on the rule event information, sends relay rule event information to the first device; based on the rule information information, and configure the forwarding rule information to the third network function; based on the rule event information, the configuration of the forwarding rule information is valid or invalid, so that the data path between the third device and the mobile network can be effectively controlled according to the rule event information, Improve mobile network security.
  • the execution subject may be a device data path management and control device.
  • the device data path management and control device performing the device data path management and control method is used as an example to illustrate the device data path management and control device provided by the embodiments of this application.
  • the device data path management and control device includes: a first transmission module 501 and a first execution module 502.
  • the first transmission module 501 is configured to receive first information from a second network function, where the first information includes rule information and rule event information; the first execution module 502 is configured to perform at least the following based on the first information:
  • the relay rule information is used to instruct the first device to forward the rules of data between the mobile network and the third device
  • the forwarding rule information is used to instruct the third network function to forward the data between the mobile network and the data network.
  • rules for data the rule event information is used to indicate the valid or invalid condition of the rule information
  • the relay rule event information is used to indicate the valid or invalid condition of the relay rule information
  • the third device It is a device that receives data from the mobile network side or sends data to the mobile network side through the first device.
  • the rule event information includes at least one of the following corresponding to the forwarding rule information:
  • Duration information valid time information, invalid time information, illegal access instructions, and number of illegal accesses.
  • the relay rule event information includes at least one of the following corresponding to the relay rule information:
  • Duration information valid time information, invalid time information.
  • the first execution module 502 is configured to perform at least one of the following:
  • the first execution The line module 502 is configured to indicate to the third network function that the forwarding rule information is valid when the current time reaches the time or time range determined by the valid time information.
  • the first execution module 502 is configured to send a request to the third execution module when the current time reaches the time or time range determined by the invalid time information.
  • Three network functions indicate that the forwarding rule information is invalid.
  • the first execution module 502 is configured to report data to the third network function when data that does not match the rule information is detected. Indicates that the forwarding rule information is invalid.
  • the first execution module 502 is configured to, if it detects that data that does not match the rule information exceeds the number of illegal accesses, The third network function indicates that the forwarding rule information is invalid.
  • the first execution module 502 is also configured to send a termination relay indication to the first device, where the termination relay indication Used to instruct the first device to terminate forwarding data between the mobile network and the third device.
  • the relay rule information and the forwarding rule information include at least one of the following:
  • the embodiments of the present application receive first information from the second network function, where the first information includes rule information and rule event information; and perform at least one of the following based on the first information: based on The rule information sends relay rule information to the first device; based on the rule event information, sends relay rule event information to the first device; based on the rule information, forwards the rule information to a third network function configuration; based on The rule event information is a configuration of valid or invalid forwarding rule information, so that the data path between the third device and the mobile network can be effectively managed and controlled based on the rule event information, thereby improving the security of the mobile network.
  • the device data path management and control device in the embodiment of the present application may be an electronic device, such as an electronic device with an operating system, or may be a component in the electronic device, such as an integrated circuit or chip.
  • the electronic device may be a terminal or other devices other than the terminal.
  • terminals may include but are not limited to the types of terminals 11 listed above, and other devices may be servers, network attached storage (Network Attached Storage, NAS), etc., which are not specifically limited in the embodiment of this application.
  • the equipment data path management and control device provided by the embodiment of the present application can implement each process implemented by the method embodiment of Figures 3 to 4, and achieve the same technical effect. To avoid duplication, no details will be given here. narrate.
  • this embodiment of the present application provides a device data path management and control method.
  • the execution subject of the method is the first device.
  • the method can be executed by software or hardware installed on the first device.
  • the method includes the following steps.
  • the first device receives second information from the mobile network side, where the second information includes at least one of the following: relay rule information and relay rule event information; termination of relay instruction;
  • the first device performs at least one of the following:
  • the third device is a device that receives data from the mobile network side or sends data to the mobile network side through the first device.
  • the relay rule event information includes at least one of the following corresponding to the relay rule information:
  • Duration information valid time information; invalid time information.
  • the valid or invalid relay rule information based on the relay rule event information includes at least one of the following:
  • the first device If the validity period determined based on the duration information is valid, the first device enables the relay rule information;
  • the first device deactivates the relay rule information.
  • the valid or invalid relay rule information based on the relay rule event information includes:
  • the first device When the current time reaches the time or time range determined by the valid time information, the first device enables the relay rule information.
  • validating or invalidating the relay rule information based on the relay rule event information includes:
  • the first device deactivates the relay rule information.
  • the relay rule information includes at least one of the following:
  • the method before the first device receives the second information from the mobile network side, the method further includes:
  • the rule event information is received from the third device.
  • the rule event information includes at least one of the following:
  • Duration information valid time information, invalid time information, illegal access instructions, and number of illegal accesses.
  • the violation access indication is used to instruct the first device to terminate forwarding data between the mobile network and the third device when data that does not match the rule information is detected.
  • the number of illegal accesses is used to instruct the first device to terminate forwarding data between the mobile network and the third device when detecting data that does not match the rule information exceeds the number of illegal accesses.
  • Steps S610-S620 can implement the method embodiment shown in Figure 3-4 and obtain the same technical effect, and the repeated parts will not be described again here.
  • the embodiments of the present application receive second information from the mobile network side, and the second information includes at least one of the following: relay rule information and relay rule event information; termination of relay instructions; and perform at least one of the following according to the second information: forward data between the mobile network and the third device based on the relay rule information; valid or invalidate the relay rule based on the relay rule event information Information; based on the termination relay indication, the forwarding of data between the mobile network and the third device is terminated, so that the data path between the third device and the mobile network can be effectively controlled according to the rule event information, and the security of the mobile network can be improved.
  • the second information includes at least one of the following: relay rule information and relay rule event information; termination of relay instructions; and perform at least one of the following according to the second information: forward data between the mobile network and the third device based on the relay rule information; valid or invalidate the relay rule based on the relay rule event information Information; based on the termination relay indication, the forwarding of data between the mobile network and the third device is terminated, so that
  • the execution subject may be a device data path management and control device.
  • the device data path management and control device performing the device data path management and control method is used as an example to illustrate the device data path management and control device provided by the embodiments of this application.
  • the device data path management and control device includes: a second transmission module 701 and a second execution module 702.
  • the second transmission module 701 is used to receive second information from the mobile network side.
  • the second information includes at least one of the following: relay rule information and relay rule event information; termination of relay instructions; the second execution Module 702 is configured to perform at least one of the following according to the second information:
  • the third device Based on the termination relay indication, terminate the forwarding of data between the mobile network and the third device; wherein the third device receives data from the mobile network side or sends data to the mobile network side through the device access management and control device. device of.
  • the relay rule event information includes the following: One item missing:
  • Duration information valid time information; invalid time information.
  • the second execution module 702 is configured to perform at least one of the following:
  • the relay rule information is deactivated.
  • the second execution module 702 is configured to enable all the events when the current time reaches the time or time range determined by the valid time information. Describe relay rule information.
  • the second execution module 702 is configured to: when the current time reaches the time or time range determined by the relay invalidation time information, Disable the relay rule information.
  • the relay rule information includes at least one of the following:
  • the second transmission module 701 is also configured to send fourth information to the second device or the second network function, where the fourth information includes rules for data forwarding. event information.
  • the rule event information is received from the third device.
  • the rule event information includes at least one of the following:
  • Duration information valid time information, invalid time information, illegal access instructions, and number of illegal accesses.
  • the illegal access indication is used to instruct to terminate the forwarding of data between the mobile network and the third device when data that does not match the rule information is detected.
  • the number of illegal accesses is used to indicate that when data that does not match the rule information is detected to exceed the number of illegal accesses, the forwarding of data between the mobile network and the third device is terminated.
  • the embodiments of the present application receive second information from the mobile network side, and the second information includes at least one of the following: relay rule information and relay rule event information; termination of relay instructions; and perform at least one of the following according to the second information: forward data between the mobile network and the third device based on the relay rule information; valid or invalidate the relay rule based on the relay rule event information information; based on the termination relay indication, terminate the forwarding movement
  • the data between the network and the third device can effectively control the data path between the third device and the mobile network based on rule event information, thereby improving the security of the mobile network.
  • the device data path management and control device in the embodiment of the present application may be an electronic device, such as an electronic device with an operating system, or may be a component in the electronic device, such as an integrated circuit or chip.
  • the electronic device may be a terminal or other devices other than the terminal.
  • terminals may include but are not limited to the types of terminals 11 listed above, and other devices may be servers, network attached storage (Network Attached Storage, NAS), etc., which are not specifically limited in the embodiment of this application.
  • the device data path management and control device provided by the embodiment of the present application can implement each process implemented by the method embodiment in Figure 6 and achieve the same technical effect. To avoid duplication, the details will not be described here.
  • this embodiment of the present application provides a device data path management and control method.
  • the method is executed by the second network function.
  • the method can be executed by software or hardware installed in the second network function.
  • the method includes the following steps.
  • the second network function sends first information to the first network function, where the first information includes rule information and rule event information.
  • the rule event information includes at least one of the following:
  • Duration information valid time information, invalid time information, illegal access instructions, and number of illegal accesses.
  • the rule information includes at least one of the following:
  • the relay rule information indicates the rules for the first device to forward data between the mobile network and the third device
  • the forwarding rule information is used to indicate the rules for the third network function to forward data between the mobile network and the data network
  • the third device is a device that receives data from the mobile network side or sends data to the mobile network side through the first device.
  • the relay rule information and the forwarding rule information include at least one of the following:
  • the rule event information is received from the first device or the second device.
  • Step S810 can implement the method embodiment shown in Figures 3-4 and obtain the same technical effect, and the repeated parts will not be described again here.
  • the embodiments of the present application send the first information to the first network function, where the first information includes rule information and rule event information, so that the third device and the mobile network can be configured according to the rule event information. Effectively manage and control data paths to improve the efficiency of mobile networks safety.
  • the execution subject may be a device data path management and control device.
  • the device data path management and control device performing the device data path management and control method is used as an example to illustrate the device data path management and control device provided by the embodiments of this application.
  • the device data path management and control device includes: a third transmission module 901 and a third execution module 902.
  • the third execution module 902 is used to obtain the first information; the third transmission module 901 is used to send the first information to the first network function, where the first information includes rule information and rule event information.
  • the rule event information includes at least one of the following:
  • Duration information valid time information, invalid time information, illegal access instructions, and number of illegal accesses.
  • the rule information includes at least one of the following:
  • the relay rule information indicates the rules for the first device to forward data between the mobile network and the third device
  • the forwarding rule information is used to indicate the rules for the third network function to forward data between the mobile network and the data network
  • the third device is a device that receives data from the mobile network side or sends data to the mobile network side through the first device.
  • the relay rule information and the forwarding rule information include at least one of the following:
  • the rule event information is received from the first device or the second device.
  • the embodiments of the present application send the first information to the first network function, where the first information includes rule information and rule event information, so that the third device and the mobile network can be configured according to the rule event information. Effectively manage and control data paths to improve the security of mobile networks.
  • the device data path management and control device in the embodiment of the present application may be an electronic device, such as an electronic device with an operating system, or may be a component in the electronic device, such as an integrated circuit or chip.
  • the electronic device may be a terminal or other devices other than the terminal.
  • terminals may include but are not limited to the types of terminals 11 listed above, and other devices may be servers, network attached storage (Network Attached Storage, NAS), etc., which are not specifically limited in the embodiment of this application.
  • the device data path management and control device provided by the embodiment of the present application can implement each process implemented by the method embodiment in Figure 8 and achieve the same technical effect. To avoid duplication, the details will not be described here.
  • an embodiment of the present application provides a device data path management and control method.
  • the execution subject of the method is a third device.
  • the method can be executed by software or hardware installed on the third device.
  • the method includes the following steps.
  • the third device sends third information to the first device or the second device, where the third information includes rule event information for data forwarding;
  • the rule event information is used to indicate relevant information for determining whether the data forwarding is valid or invalid;
  • the third device is a device that receives data from the mobile network side through the first device or sends data to the mobile network side. .
  • the rule event information includes at least one of the following:
  • Duration information valid time information, invalid time information, illegal access instructions, and number of illegal accesses.
  • the violation access indication is used to instruct the first device to terminate forwarding data between the mobile network and the third device when data that does not match the rule information is detected.
  • the number of illegal accesses is used to indicate that when data that does not match the rule information is detected to exceed the number of illegal accesses, instruct the first device to terminate forwarding between the mobile network and the third device. data.
  • Step S1010 can implement the method embodiment shown in Figures 3-4 and obtain the same technical effect, and the repeated parts will not be described again here.
  • the embodiments of the present application send third information to the first device or the second device.
  • the third information includes rule event information for data forwarding; wherein the rule event information is used to indicate Relevant information that determines whether the data forwarding is valid or invalid can effectively control the data path between the third device and the mobile network based on the rule event information, thereby improving the security of the mobile network.
  • the execution subject may be a device data path management and control device.
  • the device data path management and control device performing the device data path management and control method is used as an example to illustrate the device data path management and control device provided by the embodiments of this application.
  • the device data path management and control device includes: a fourth transmission module 1101 and a fourth execution module 1102.
  • the fourth execution module 1102 is used to obtain third information; the fourth transmission module 1101 is used to send the third information to the first device or the second device, where the third information includes rule event information for data forwarding. ; Wherein, the rule event information is used to indicate relevant information for determining whether the data forwarding is valid or invalid; the device access management and control device is to receive data from the mobile network side through the first device or send data to the mobile network side. data device.
  • the rule event information includes at least one of the following:
  • Duration information valid time information, invalid time information, illegal access instructions, illegal access Ask the number of times.
  • the violation access indication is used to instruct the first device to terminate forwarding data between the mobile network and the third device when data that does not match the rule information is detected.
  • the number of illegal accesses is used to indicate that when data that does not match the rule information is detected to exceed the number of illegal accesses, instruct the first device to terminate forwarding between the mobile network and the third device. data.
  • the embodiments of the present application send third information to the first device or the second device.
  • the third information includes rule event information for data forwarding; wherein the rule event information is used to indicate Relevant information that determines whether the data forwarding is valid or invalid can effectively control the data path between the third device and the mobile network based on the rule event information, thereby improving the security of the mobile network.
  • the device data path management and control device in the embodiment of the present application may be an electronic device, such as an electronic device with an operating system, or may be a component in the electronic device, such as an integrated circuit or chip.
  • the electronic device may be a terminal or other devices other than the terminal.
  • terminals may include but are not limited to the types of terminals 11 listed above, and other devices may be servers, network attached storage (Network Attached Storage, NAS), etc., which are not specifically limited in the embodiment of this application.
  • the device data path management and control device provided by the embodiment of the present application can implement each process implemented by the method embodiment in Figure 10 and achieve the same technical effect. To avoid duplication, the details will not be described here.
  • this embodiment of the present application provides a device data path management and control method.
  • the execution subject of the method is the second device.
  • the method can be executed by software or hardware installed on the second device.
  • the method also includes the following steps.
  • the second device sends fourth information to the second network function, where the fourth information includes rule event information for data forwarding; the rule event information is used to indicate relevant information for determining whether the data forwarding is valid or invalid.
  • the rule event information includes at least one of the following:
  • Duration information valid time information, invalid time information, illegal access instructions, and number of illegal accesses.
  • the rule event information is received from the third device or the first device;
  • the third device is a device that receives data from the mobile network side or sends data to the mobile network side through the first device.
  • the illegal access indication is used to instruct the first device to terminate forwarding data between the mobile network and the third device when data that does not match the rule information is detected.
  • the number of illegal accesses is used to indicate that when data that does not match the rule information is detected to exceed the number of illegal accesses, instruct the first device to terminate forwarding between the mobile network and the third device. backup data.
  • Step S1210 can implement the method embodiment shown in Figures 3-4 and obtain the same technical effect, and the repeated parts will not be described again here.
  • the embodiments of the present application send fourth information to the second network function.
  • the fourth information includes rule event information for data forwarding; the rule event information is used to indicate the determination of the data forwarding. Valid or invalid relevant information, so that the data path between the third device and the mobile network can be effectively controlled based on the rule event information, and the security of the mobile network can be improved.
  • the execution subject may be a device data path management and control device.
  • the device data path management and control device performing the device data path management and control method is used as an example to illustrate the device data path management and control device provided by the embodiments of this application.
  • the device data path management and control device includes: a fifth transmission module 1301 and a fifth execution module 1302.
  • the fifth execution module 1302 is used to obtain fourth information; the fifth transmission module 1301 is used to send fourth information to the second network function, where the fourth information includes rule event information for data forwarding; the rule event The information is used to indicate relevant information that determines whether the data forwarding is valid or invalid.
  • the rule event information includes at least one of the following:
  • Duration information valid time information, invalid time information, illegal access instructions, and number of illegal accesses.
  • the rule event information is received from the third device or the first device;
  • the third device is a device that receives data from the mobile network side or sends data to the mobile network side through the first device.
  • the illegal access indication is used to instruct the first device to terminate forwarding data between the mobile network and the third device when data that does not match the rule information is detected.
  • the number of illegal accesses is used to instruct the first device to terminate forwarding data between the mobile network and the third device when detecting data that does not match the rule information exceeds the number of illegal accesses.
  • the embodiments of the present application send fourth information to the second network function.
  • the fourth information includes rule event information for data forwarding; the rule event information is used to indicate the determination of the data forwarding. Valid or invalid relevant information, so that the data path between the third device and the mobile network can be effectively controlled based on the rule event information, and the security of the mobile network can be improved.
  • the device data path management and control device in the embodiment of the present application may be an electronic device, such as an electronic device with an operating system, or may be a component in the electronic device, such as an integrated circuit or chip.
  • the electronic device may be a terminal or other devices other than the terminal.
  • the terminal can The types of terminals 11 include but are not limited to those listed above.
  • Other devices may be servers, network attached storage (Network Attached Storage, NAS), etc., which are not specifically limited in the embodiments of this application.
  • the device data path management and control device provided by the embodiment of the present application can implement each process implemented by the method embodiment in Figure 12 and achieve the same technical effect. To avoid duplication, the details will not be described here.
  • this embodiment of the present application also provides a communication device 1400, which includes a processor 1401 and a memory 1402.
  • the memory 1402 stores programs or instructions that can be run on the processor 1401, such as , when the communication device 1400 is a terminal, when the program or instruction is executed by the processor 1401, each step of the above device data path management and control method embodiment is implemented, and the same technical effect can be achieved.
  • the communication device 1400 is a network-side device, when the program or instruction is executed by the processor 1401, each step of the above device data path management and control method embodiment is implemented, and the same technical effect can be achieved. To avoid duplication, the details are not repeated here.
  • An embodiment of the present application also provides a terminal, including a processor and a communication interface.
  • the processor is configured to perform at least one of the following according to the second information: forwarding the communication between the mobile network and a third device based on the relay rule information. data; based on the relay rule event information, the relay rule information is valid or invalid; based on the termination relay indication, terminates the forwarding of data between the mobile network and the third device, and the communication interface is used to receive from the mobile network side
  • the second information includes at least one of the following: relay rule information and relay rule event information; and an instruction to terminate relay.
  • This terminal embodiment corresponds to the above-mentioned terminal-side method embodiment. Each implementation process and implementation manner of the above-mentioned method embodiment can be applied to this terminal embodiment, and can achieve the same technical effect.
  • FIG. 15 is a schematic diagram of the hardware structure of a terminal that implements an embodiment of the present application.
  • the terminal 1500 includes but is not limited to: a radio frequency unit 1501, a network module 1502, an audio output unit 1503, an input unit 1504, a sensor 1505, a display unit 1506, a user input unit 1507, an interface unit 1508, a memory 1509, a processor 1510, etc. At least some parts.
  • the terminal 1500 may also include a power supply (such as a battery) that supplies power to various components.
  • the power supply may be logically connected to the processor 1510 through a power management system, thereby managing charging, discharging, and power consumption through the power management system. Management and other functions.
  • the terminal structure shown in FIG. 15 does not constitute a limitation on the terminal.
  • the terminal may include more or fewer components than shown in the figure, or some components may be combined or arranged differently, which will not be described again here.
  • the input unit 1504 may include a graphics processing unit (GPU) 15041 and a microphone 15042.
  • the GPU 15041 is used for recording data by an image capture device (such as a camera) in the video capture mode or the image capture mode.
  • the image data obtained from still pictures or videos is processed.
  • the display unit 1506 may include a display panel 15061, which may be configured in the form of a liquid crystal display, an organic light emitting diode, or the like.
  • the user input unit 1507 includes a touch panel 15071 and at least one of other input devices 15072 .
  • touch surface Board 15071 also known as touch screen.
  • the touch panel 15071 may include two parts: a touch detection device and a touch controller.
  • Other input devices 15072 may include but are not limited to physical keyboards, function keys (such as volume control keys, switch keys, etc.), trackballs, mice, and joysticks, which will not be described again here.
  • the radio frequency unit 1501 can transmit it to the processor 1510 for processing; in addition, the radio frequency unit 1501 can send uplink data to the network side device.
  • the radio frequency unit 1501 includes, but is not limited to, an antenna, amplifier, transceiver, coupler, low noise amplifier, duplexer, etc.
  • Memory 1509 may be used to store software programs or instructions as well as various data.
  • the memory 1509 may mainly include a first storage area for storing programs or instructions and a second storage area for storing data, wherein the first storage area may store an operating system, an application program or instructions required for at least one function (such as a sound playback function, Image playback function, etc.) etc.
  • memory 1509 may include volatile memory or nonvolatile memory, or memory 1509 may include both volatile and nonvolatile memory.
  • non-volatile memory can be read-only memory (Read-Only Memory, ROM), programmable read-only memory (Programmable ROM, PROM), erasable programmable read-only memory (Erasable PROM, EPROM), electrically removable memory.
  • Volatile memory can be random access memory (Random Access Memory, RAM), static random access memory (Static RAM, SRAM), dynamic random access memory (Dynamic RAM, DRAM), synchronous dynamic random access memory (Synchronous DRAM, SDRAM), double data rate synchronous dynamic random access memory (Double Data Rate SDRAM, DDRSDRAM), enhanced synchronous dynamic random access memory (Enhanced SDRAM, ESDRAM), synchronous link dynamic random access memory (Synch link DRAM) , SLDRAM) and direct memory bus random access memory (Direct Rambus RAM, DRRAM).
  • RAM Random Access Memory
  • SRAM static random access memory
  • DRAM dynamic random access memory
  • synchronous dynamic random access memory Synchronous DRAM, SDRAM
  • Double data rate synchronous dynamic random access memory Double Data Rate SDRAM, DDRSDRAM
  • Enhanced SDRAM, ESDRAM synchronous link dynamic random access memory
  • Synch link DRAM synchronous link dynamic random access memory
  • SLDRAM direct memory bus random access memory
  • the processor 1510 may include one or more processing units; optionally, the processor 1510 integrates an application processor and a modem processor, where the application processor mainly handles operations related to the operating system, user interface, application programs, etc., Modem processors mainly process wireless communication signals, such as baseband processors. It can be understood that the above modem processor may not be integrated into the processor 1510.
  • the radio frequency unit 1501 is configured to receive second information from the mobile network side, where the second information includes at least one of the following: relay rule information and relay rule event information; and a relay termination indication.
  • Processor 1510 configured to perform at least one of the following according to the second information:
  • the relay rule event information includes the following: One item missing:
  • Duration information valid time information; invalid time information.
  • the processor 1510 is configured to perform at least one of the following:
  • the relay rule information is deactivated.
  • the processor 1510 is configured to enable the medium when the current time reaches the time or time range determined by the valid time information. Following rule information.
  • the processor 1510 is configured to deactivate the relay when the current time reaches the time or time range determined by the relay invalid time information.
  • the relay rule information is configured to deactivate the relay when the current time reaches the time or time range determined by the relay invalid time information.
  • the relay rule information includes at least one of the following:
  • the radio frequency unit 1501 is also configured to send fourth information to the second device or the second network function, where the fourth information includes rule event information for data forwarding. .
  • the rule event information is received from the third device.
  • the rule event information includes at least one of the following:
  • Duration information valid time information, invalid time information, illegal access instructions, and number of illegal accesses.
  • the illegal access indication is used to instruct to terminate the forwarding of data between the mobile network and the third device when data that does not match the rule information is detected.
  • the number of illegal accesses is used to indicate that when data that does not match the rule information is detected to exceed the number of illegal accesses, the forwarding of data between the mobile network and the third device is terminated.
  • the embodiments of this application can effectively control the data path between the third device and the mobile network based on rule event information, thereby improving the security of the mobile network.
  • the embodiment of the present application also provides a network side device.
  • the network side device 1600 includes: a processor 1601, a network interface 1602, and a memory 1603.
  • the network interface 1602 is, for example, a common public radio interface (CPRI).
  • CPRI common public radio interface
  • the network side device 1600 in this embodiment of the present invention also includes: instructions or programs stored in the memory 1603 and executable on the processor 1601.
  • the processor 1601 calls the instructions or programs in the memory 1603 to execute Figure 5 or Figure 9
  • the execution methods of each module are shown and achieve the same technical effect. To avoid repetition, they will not be described in detail here.
  • Embodiments of the present application also provide a readable storage medium.
  • Programs or instructions are stored on the readable storage medium.
  • the program or instructions are executed by a processor, each process of the above device data path management and control method embodiment is implemented, and can To achieve the same technical effect, to avoid repetition, we will not repeat them here.
  • the processor is the processor in the terminal described in the above embodiment.
  • the readable storage medium may be non-volatile or non-transient.
  • the readable storage medium may include computer-readable storage media, such as computer read-only memory ROM, random access memory RAM, and magnetic disks. Or CD, etc.
  • An embodiment of the present application further provides a chip.
  • the chip includes a processor and a communication interface.
  • the communication interface is coupled to the processor.
  • the processor is used to run programs or instructions to implement the above device data path management and control method. Each process in the example can achieve the same technical effect. To avoid repetition, we will not repeat it here.
  • chips mentioned in the embodiments of this application may also be called system-on-chip, system-on-a-chip, system-on-chip or system-on-chip, etc.
  • Embodiments of the present application further provide a computer program/program product.
  • the computer program/program product is stored in a storage medium.
  • the computer program/program product is executed by at least one processor to implement the above device data path management and control method.
  • Each process of the embodiment can achieve the same technical effect, so to avoid repetition, it will not be described again here.
  • Embodiments of the present application also provide a device data path management and control system, including: a first device, a second device, a third device, a first network function and a second network function.
  • the first device, the second device, the third device The three devices, the first network function and the second network function may be used to perform the steps of the device data path management and control method as described above.
  • the methods of the above embodiments can be implemented by means of software plus the necessary general hardware platform. Of course, it can also be implemented by hardware, but in many cases the former is better. implementation.
  • the technical solution of the present application can be embodied in the form of a computer software product that is essentially or contributes to related technologies.
  • the computer software product is stored in a storage medium (such as ROM/RAM, disk, CD), including several instructions to cause a terminal (which can be a mobile phone, computer, server, air conditioner, or network device, etc.) to execute the methods described in various embodiments of this application.

Abstract

The present application relates to the field of mobile communications, and discloses a device data path management and control method, a device, a terminal, and a network side device. The device data path management and control method in embodiments of the present application comprises: a first network function receives first information from a second network function, the first information comprising rule information and rule event information; and according to the first information, the first network function executes at least one of the following: on the basis of the rule information, sending relay rule information to a first device; on the basis of the rule event information, sending relay rule event information to the first device; on the basis of the rule information, configuring forwarding rule information for a third network function; and on the basis of the rule event information, validating or invalidating the configuration of the forwarding rule information.

Description

设备数据路径管控方法、设备、终端及网络侧设备Device data path management and control methods, devices, terminals and network-side devices
交叉引用cross reference
本发明要求在2022年07月13日提交中国专利局、申请号为202210821333.5、发明名称为“设备数据路径管控方法、设备、终端及网络侧设备”的中国专利申请的优先权,该申请的全部内容通过引用结合在本发明中。This invention requires the priority of the Chinese patent application submitted to the China Patent Office on July 13, 2022, with the application number 202210821333.5 and the invention name "Equipment Data Path Management and Control Method, Equipment, Terminal and Network Side Equipment". All of the application The contents are incorporated herein by reference.
技术领域Technical field
本申请属于移动通信技术领域,具体涉及一种设备数据路径管控方法、设备、终端及网络侧设备。This application belongs to the field of mobile communication technology, and specifically relates to a device data path management and control method, equipment, terminals and network side equipment.
背景技术Background technique
相关技术支持物联网(Internet of Things,IoT)远程下载,以凭证(Credential)下载为例,物联网的接入设备在需要远程下载credential时,就需要请求移动网络开放下载路径,但对于移动网络开放后的路径存在安全风险,比如被攻击的设备会使用该路径频繁发送信息对移动网络进行攻击。Related technologies support remote downloading of the Internet of Things (IoT). Taking Credential downloading as an example, when the access device of the Internet of Things needs to download credentials remotely, it needs to request the mobile network to open the download path, but for the mobile network There are security risks in the open path. For example, the attacked device will use this path to frequently send information to attack the mobile network.
发明内容Contents of the invention
本申请实施例提供一种设备数据路径管控方法、设备、终端及网络侧设备,能够解决开放后的路径存在安全风险的问题。Embodiments of the present application provide a device data path management and control method, device, terminal and network side device, which can solve the problem of security risks in the opened path.
第一方面,提供了一种设备数据路径管控方法,应用于第一网络功能,该方法包括:In the first aspect, a device data path management and control method is provided, which is applied to the first network function. The method includes:
第一网络功能从第二网络功能接收第一信息,所述第一信息包括规则信息和规则事件信息;The first network function receives first information from the second network function, the first information including rule information and rule event information;
根据所述第一信息,所述第一网络功能执行以下至少一项:According to the first information, the first network function performs at least one of the following:
基于所述规则信息,向第一设备发送中继规则信息;Based on the rule information, send relay rule information to the first device;
基于所述规则事件信息,向第一设备发送中继规则事件信息;Based on the rule event information, send relay rule event information to the first device;
基于所述规则信息,向第三网络功能配置转发规则信息;Based on the rule information, forward the rule information to a third network function configuration;
基于所述规则事件信息,有效或无效所述转发规则信息的配置;Validate or invalidate the configuration of the forwarding rule information based on the rule event information;
其中,所述中继规则信息用于指示所述第一设备转发移动网络与第三设备间的数据的规则,所述转发规则信息用于指示所述第三网络功能转发移动网络与数据网络间的数据的规则,所述规则事件信息用于指示所述规则信息的有效或无效条件,所述中继规则事件信息用于指示所述中继规则信息的有效或无效条件,所述第三设备为通过所述第一设备接收来自移动网络侧的数据或向移动网络侧发送数据的设备。 Wherein, the relay rule information is used to instruct the first device to forward the rules of data between the mobile network and the third device, and the forwarding rule information is used to instruct the third network function to forward the data between the mobile network and the data network. rules for data, the rule event information is used to indicate the valid or invalid condition of the rule information, the relay rule event information is used to indicate the valid or invalid condition of the relay rule information, the third device It is a device that receives data from the mobile network side or sends data to the mobile network side through the first device.
第二方面,提供了一种设备数据路径管控装置,包括:In the second aspect, a device data path management and control device is provided, including:
第一传输模块,用于从第二网络功能接收第一信息,所述第一信息包括规则信息和规则事件信息;A first transmission module configured to receive first information from the second network function, where the first information includes rule information and rule event information;
第一执行模块,用于根据所述第一信息执行以下至少一项:A first execution module, configured to execute at least one of the following according to the first information:
基于所述规则信息,向第一设备发送中继规则信息;Based on the rule information, send relay rule information to the first device;
基于所述规则事件信息,向第一设备发送中继规则事件信息;Based on the rule event information, send relay rule event information to the first device;
基于所述规则信息,向第三网络功能配置转发规则信息;Based on the rule information, forward the rule information to a third network function configuration;
基于所述规则事件信息,有效或无效所述转发规则信息的配置;Validate or invalidate the configuration of the forwarding rule information based on the rule event information;
其中,所述中继规则信息用于指示所述第一设备转发移动网络与第三设备间的数据的规则,所述转发规则信息用于指示所述第三网络功能转发移动网络与数据网络间的数据的规则,所述规则事件信息用于指示所述规则信息的有效或无效条件,所述中继规则事件信息用于指示所述中继规则信息的有效或无效条件,所述第三设备为通过所述第一设备接收来自移动网络侧的数据或向移动网络侧发送数据的设备。Wherein, the relay rule information is used to instruct the first device to forward the rules of data between the mobile network and the third device, and the forwarding rule information is used to instruct the third network function to forward the data between the mobile network and the data network. rules for data, the rule event information is used to indicate the valid or invalid condition of the rule information, the relay rule event information is used to indicate the valid or invalid condition of the relay rule information, the third device It is a device that receives data from the mobile network side or sends data to the mobile network side through the first device.
第三方面,提供了一种设备数据路径管控方法,应用于第一设备,该方法包括:In the third aspect, a device data path management and control method is provided, applied to the first device, and the method includes:
第一设备从移动网络侧接收第二信息,所述第二信息包括以下至少一项:中继规则信息和中继规则事件信息;终止中继指示;The first device receives second information from the mobile network side, where the second information includes at least one of the following: relay rule information and relay rule event information; termination of relay indication;
根据所述第二信息,所述第一设备执行以下至少一项:According to the second information, the first device performs at least one of the following:
基于所述中继规则信息转发所述移动网络与第三设备间的数据;Forward data between the mobile network and the third device based on the relay rule information;
基于所述中继规则事件信息,有效或无效所述中继规则信息;Validate or invalidate the relay rule information based on the relay rule event information;
基于所述终止中继指示,终止转发移动网络与第三设备间的数据;其中,所述第三设备为通过所述第一设备接收来自移动网络侧的数据或向移动网络侧发送数据的设备。Based on the termination relay indication, terminate the forwarding of data between the mobile network and the third device; wherein the third device is a device that receives data from the mobile network side or sends data to the mobile network side through the first device. .
第四方面,提供了一种设备数据路径管控装置,包括:In the fourth aspect, a device data path management and control device is provided, including:
第二传输模块,用于从移动网络侧接收第二信息,所述第二信息包括以下至少一项:中继规则信息和中继规则事件信息;终止中继指示;The second transmission module is configured to receive second information from the mobile network side, where the second information includes at least one of the following: relay rule information and relay rule event information; termination of relay indication;
第二执行模块,用于根据所述第二信息执行以下至少一项:A second execution module, configured to execute at least one of the following according to the second information:
基于所述中继规则信息转发所述移动网络与第三设备间的数据;Forward data between the mobile network and the third device based on the relay rule information;
基于所述中继规则事件信息,有效或无效所述中继规则信息;Validate or invalidate the relay rule information based on the relay rule event information;
基于所述终止中继指示,终止转发移动网络与第三设备间的数据;其中,所述第三设备为通过所述设备接入管控装置接收来自移动网络侧的数据或向移动网络侧发送数据的设备。Based on the termination relay indication, terminate the forwarding of data between the mobile network and the third device; wherein the third device receives data from the mobile network side or sends data to the mobile network side through the device access management and control device. device of.
第五方面,提供了一种设备数据路径管控方法,应用于第二网络功能,该方法包括: In the fifth aspect, a device data path management and control method is provided, which is applied to the second network function. The method includes:
第二网络功能向第一网络功能发送第一信息,所述第一信息包括规则信息和规则事件信息。The second network function sends first information to the first network function, where the first information includes rule information and rule event information.
第六方面,提供了一种设备数据路径管控装置,包括:In the sixth aspect, a device data path management and control device is provided, including:
第三执行模块,用于获取第一信息;The third execution module is used to obtain the first information;
第三传输模块,用于向第一网络功能发送第一信息,所述第一信息包括规则信息和规则事件信息。The third transmission module is configured to send first information to the first network function, where the first information includes rule information and rule event information.
第七方面,提供了一种设备数据路径管控方法,应用于第三设备,该方法包括:The seventh aspect provides a device data path management and control method applied to a third device. The method includes:
第三设备向第一设备或第二设备发送第三信息,所述第三信息包括数据转发的规则事件信息;The third device sends third information to the first device or the second device, where the third information includes rule event information for data forwarding;
其中,所述规则事件信息用于指示确定所述数据转发有效或失效的相关信息;所述第三设备为通过所述第一设备接收来自移动网络侧的数据或向移动网络侧发送数据的设备。Wherein, the rule event information is used to indicate relevant information for determining whether the data forwarding is valid or invalid; the third device is a device that receives data from the mobile network side through the first device or sends data to the mobile network side. .
第八方面,提供了一种设备数据路径管控装置,包括:In an eighth aspect, a device data path management and control device is provided, including:
第四执行模块,用于获取第三信息;The fourth execution module is used to obtain the third information;
第四传输模块,用于向第一设备或第二设备发送所述第三信息,所述第三信息包括数据转发的规则事件信息;A fourth transmission module, configured to send the third information to the first device or the second device, where the third information includes rule event information for data forwarding;
其中,所述规则事件信息用于指示确定所述数据转发有效或失效的相关信息;所述设备接入管控装置为通过所述第一设备接收来自移动网络侧的数据或向移动网络侧发送数据的设备。Wherein, the rule event information is used to indicate relevant information for determining whether the data forwarding is valid or invalid; the device access management and control device is to receive data from the mobile network side through the first device or send data to the mobile network side. device of.
第九方面,提供了一种设备数据路径管控方法,应用于第二设备,该方法包括:In the ninth aspect, a device data path management and control method is provided, applied to the second device, and the method includes:
第二设备向第二网络功能发送第四信息,所述第四信息包括数据转发的规则事件信息;所述规则事件信息用于指示确定所述数据转发有效或失效的相关信息。The second device sends fourth information to the second network function, where the fourth information includes rule event information for data forwarding; the rule event information is used to indicate relevant information for determining whether the data forwarding is valid or invalid.
第十方面,提供了一种设备数据路径管控装置,包括:In a tenth aspect, a device data path management and control device is provided, including:
第五执行模块,用于获取第四信息;The fifth execution module is used to obtain the fourth information;
第五传输模块,用于向第二网络功能发送第四信息,所述第四信息包括数据转发的规则事件信息;所述规则事件信息用于指示确定所述数据转发有效或失效的相关信息。The fifth transmission module is configured to send fourth information to the second network function, where the fourth information includes rule event information for data forwarding; the rule event information is used to indicate relevant information for determining whether the data forwarding is valid or invalid.
第十一方面,提供了一种终端,该终端包括处理器和存储器,所述存储器存储可在所述处理器上运行的程序或指令,所述程序或指令被所述处理器执行时实现如第三方面、第七方面或第九方面所述的方法的步骤。In an eleventh aspect, a terminal is provided. The terminal includes a processor and a memory. The memory stores programs or instructions that can be run on the processor. When the program or instructions are executed by the processor, the following is implemented: The steps of the method described in the third, seventh or ninth aspect.
第十二方面,提供了一种终端,包括处理器及通信接口,其中,所述处理器用于根据所述第二信息执行以下至少一项:基于所述中继规则信息转发 所述移动网络与第三设备间的数据;基于所述中继规则事件信息,有效或无效所述中继规则信息;基于所述终止中继指示,终止转发移动网络与第三设备间的数据,所述通信接口用于从移动网络侧接收第二信息,所述第二信息包括以下至少一项:中继规则信息和中继规则事件信息;终止中继指示。In a twelfth aspect, a terminal is provided, including a processor and a communication interface, wherein the processor is configured to perform at least one of the following according to the second information: forwarding based on the relay rule information Data between the mobile network and the third device; Validating or invalidating the relay rule information based on the relay rule event information; Terminating forwarding of data between the mobile network and the third device based on the termination relay indication , the communication interface is used to receive second information from the mobile network side, where the second information includes at least one of the following: relay rule information and relay rule event information; and a termination relay indication.
第十三方面,提供了一种网络侧设备,该网络侧设备包括处理器和存储器,所述存储器存储可在所述处理器上运行的程序或指令,所述程序或指令被所述处理器执行时实现如第一方面或第五方面所述的方法的步骤。In a thirteenth aspect, a network side device is provided. The network side device includes a processor and a memory. The memory stores programs or instructions that can be run on the processor. The program or instructions are used by the processor. When executed, the steps of the method described in the first aspect or the fifth aspect are implemented.
第十四方面,提供了一种设备数据路径管控系统,包括:第一设备、第二设备、第三设备、第一网络功能和第二网络功能,所述第一网络功能可用于执行如第一方面所述的设备数据路径管控方法的步骤,所述第一设备可用于执行如第三方面所述的设备数据路径管控方法的步骤,所述第二网络功能可用于执行如第五方面所述的设备数据路径管控方法的步骤,所述第三设备可用于执行如第七方面所述的设备数据路径管控方法的步骤,所述第二设备可用于执行如第九方面所述的设备数据路径管控方法的步骤。In a fourteenth aspect, a device data path management and control system is provided, including: a first device, a second device, a third device, a first network function and a second network function. The first network function can be used to perform the following steps: The steps of the device data path management and control method described in one aspect, the first device can be used to perform the steps of the device data path management and control method described in the third aspect, and the second network function can be used to perform the steps of the device data path management and control method described in the fifth aspect. The steps of the device data path management and control method described in the seventh aspect, the third device can be used to perform the steps of the device data path management and control method described in the seventh aspect, and the second device can be used to perform the device data path management and control method described in the ninth aspect. Steps of the path management method.
第十五方面,提供了一种可读存储介质,所述可读存储介质上存储程序或指令,所述程序或指令被处理器执行时实现如第一方面所述的方法的步骤,或者实现如第三方面所述的方法的步骤,或者实现如第五方面所述的方法的步骤,或者实现如第七方面所述的方法的步骤,或者实现如第九方面所述的方法的步骤。In a fifteenth aspect, a readable storage medium is provided. Programs or instructions are stored on the readable storage medium. When the programs or instructions are executed by a processor, the steps of the method described in the first aspect are implemented, or the steps of the method are implemented. The steps of the method described in the third aspect, or the steps of implementing the method described in the fifth aspect, or the steps of the method described in the seventh aspect, or the steps of the method described in the ninth aspect.
第十六方面,提供了一种芯片,所述芯片包括处理器和通信接口,所述通信接口和所述处理器耦合,所述处理器用于运行程序或指令,实现如第一方面所述的方法的步骤,或者实现如第三方面所述的方法的步骤,或者实现如第五方面所述的方法的步骤,或者实现如第七方面所述的方法的步骤,或者实现如第九方面所述的方法的步骤。In a sixteenth aspect, a chip is provided. The chip includes a processor and a communication interface. The communication interface is coupled to the processor. The processor is used to run programs or instructions to implement the method described in the first aspect. The steps of the method, or the steps of realizing the method described in the third aspect, or the steps of realizing the method described in the fifth aspect, or the steps of realizing the method described in the seventh aspect, or realizing the steps of the method described in the ninth aspect steps of the method described.
第十七方面,提供了一种计算机程序/程序产品,所述计算机程序/程序产品被存储在存储介质中,所述计算机程序/程序产品被至少一个处理器执行以实现如第一方面所述的方法的步骤,或者实现如第三方面所述的方法的步骤,或者实现如第五方面所述的方法的步骤,或者实现如第七方面所述的方法的步骤,或者实现如第九方面所述的方法的步骤。In a seventeenth aspect, a computer program/program product is provided, the computer program/program product is stored in a storage medium, and the computer program/program product is executed by at least one processor to implement the first aspect The steps of the method, or the steps of the method described in the third aspect, or the steps of the method described in the fifth aspect, or the steps of the method described in the seventh aspect, or the ninth aspect steps of the method.
在本申请实施例中,通过从第二网络功能接收第一信息,所述第一信息包括规则信息和规则事件信息;并根据所述第一信息执行以下至少一项:基于所述规则信息,向第一设备发送中继规则信息;基于所述规则事件信息,向第一设备发送中继规则事件信息;基于所述规则信息,向第三网络功能配置转发规则信息;基于所述规则事件信息,有效或无效所述转发规则信息的配置,从而可以根据规则事件信息对第三设备与移动网络的数据路径进行有 效管控,提高移动网络的安全性。In this embodiment of the present application, by receiving first information from the second network function, the first information includes rule information and rule event information; and performing at least one of the following according to the first information: based on the rule information, sending relay rule information to the first device; based on the rule event information, sending relay rule event information to the first device; based on the rule information, forwarding the rule information to a third network function configuration; based on the rule event information , valid or invalid configuration of the forwarding rule information, so that the data path between the third device and the mobile network can be effectively configured according to the rule event information. Effective management and control to improve the security of mobile networks.
附图说明Description of drawings
图1是本申请实施例可应用的一种无线通信系统的结构示意图;Figure 1 is a schematic structural diagram of a wireless communication system applicable to the embodiment of the present application;
图2是本申请实施例提供的一种设备数据路径管理系统的结构示意图;Figure 2 is a schematic structural diagram of a device data path management system provided by an embodiment of the present application;
图3是本申请实施例提供的一种设备数据路径管控方法的流程示意图;Figure 3 is a schematic flow chart of a device data path management and control method provided by an embodiment of the present application;
图4是本申请实施例提供的一种设备数据路径管控方法的信令流程示意图;Figure 4 is a schematic diagram of the signaling flow of a device data path management and control method provided by an embodiment of the present application;
图5是本申请实施例提供的一种设备数据路径管控装置的结构示意图;Figure 5 is a schematic structural diagram of a device data path management and control device provided by an embodiment of the present application;
图6是本申请实施例提供的另一种设备数据路径管控方法的流程示意图;Figure 6 is a schematic flowchart of another device data path management and control method provided by an embodiment of the present application;
图7是本申请实施例提供的另一种设备数据路径管控装置的结构示意图;Figure 7 is a schematic structural diagram of another device data path management and control device provided by an embodiment of the present application;
图8是本申请实施例提供的另一种设备数据路径管控方法的流程示意图;Figure 8 is a schematic flow chart of another device data path management and control method provided by an embodiment of the present application;
图9是本申请实施例提供的另一种设备数据路径管控装置的结构示意图;Figure 9 is a schematic structural diagram of another device data path management and control device provided by an embodiment of the present application;
图10是本申请实施例提供的另一种设备数据路径管控方法的流程示意图;Figure 10 is a schematic flowchart of another device data path management and control method provided by an embodiment of the present application;
图11是本申请实施例提供的另一种设备数据路径管控装置的结构示意图;Figure 11 is a schematic structural diagram of another device data path management and control device provided by an embodiment of the present application;
图12是本申请实施例提供的另一种设备数据路径管控方法的流程示意图;Figure 12 is a schematic flow chart of another device data path management and control method provided by an embodiment of the present application;
图13是本申请实施例提供的另一种设备数据路径管控装置的结构示意图;Figure 13 is a schematic structural diagram of another device data path management and control device provided by an embodiment of the present application;
图14是本申请实施例提供的一种通信设备结构示意图;Figure 14 is a schematic structural diagram of a communication device provided by an embodiment of the present application;
图15为实现本申请实施例的一种终端的结构示意图;Figure 15 is a schematic structural diagram of a terminal that implements an embodiment of the present application;
图16为实现本申请实施例的一种网络侧设备的结构示意图。Figure 16 is a schematic structural diagram of a network side device that implements an embodiment of the present application.
具体实施方式Detailed ways
下面将结合本申请实施例中的附图,对本申请实施例中的技术方案进行清楚描述,显然,所描述的实施例是本申请一部分实施例,而不是全部的实施例。基于本申请中的实施例,本领域普通技术人员所获得的所有其他实施例,都属于本申请保护的范围。The technical solutions in the embodiments of the present application will be clearly described below with reference to the accompanying drawings in the embodiments of the present application. Obviously, the described embodiments are part of the embodiments of the present application, but not all of the embodiments. Based on the embodiments in this application, all other embodiments obtained by those of ordinary skill in the art fall within the scope of protection of this application.
本申请的说明书和权利要求书中的术语“第一”、“第二”等是用于区别类似的对象,而不用于描述特定的顺序或先后次序。应该理解这样使用的术语在适当情况下可以互换,以便本申请的实施例能够以除了在这里图示或描述的那些以外的顺序实施,且“第一”、“第二”所区别的对象通常为一类,并不限定对象的个数,例如第一对象可以是一个,也可以是多个。此外, 说明书以及权利要求中“和/或”表示所连接对象的至少其中之一,字符“/”一般表示前后关联对象是一种“或”的关系。The terms "first", "second", etc. in the description and claims of this application are used to distinguish similar objects and are not used to describe a specific order or sequence. It is to be understood that the terms so used are interchangeable under appropriate circumstances so that the embodiments of the present application can be practiced in sequences other than those illustrated or described herein, and that "first" and "second" are distinguished objects It is usually one type, and the number of objects is not limited. For example, the first object can be one or multiple. also, In the description and claims, "and/or" means at least one of the connected objects, and the character "/" generally means that the related objects are in an "or" relationship.
值得指出的是,本申请实施例所描述的技术不限于长期演进型(Long Term Evolution,LTE)/LTE的演进(LTE-Advanced,LTE-A)系统,还可用于其他无线通信系统,诸如码分多址(Code Division Multiple Access,CDMA)、时分多址(Time Division Multiple Access,TDMA)、频分多址(Frequency Division Multiple Access,FDMA)、正交频分多址(Orthogonal Frequency Division Multiple Access,OFDMA)、单载波频分多址(Single-carrier Frequency Division Multiple Access,SC-FDMA)和其他系统。本申请实施例中的术语“系统”和“网络”常被可互换地使用,所描述的技术既可用于以上提及的系统和无线电技术,也可用于其他系统和无线电技术。以下描述出于示例目的描述了新空口(New Radio,NR)系统,并且在以下大部分描述中使用NR术语,但是这些技术也可应用于NR系统应用以外的应用,如第6代(6th Generation,6G)通信系统。It is worth pointing out that the technology described in the embodiments of this application is not limited to Long Term Evolution (LTE)/LTE Evolution (LTE-Advanced, LTE-A) systems, and can also be used in other wireless communication systems, such as code Code Division Multiple Access (CDMA), Time Division Multiple Access (TDMA), Frequency Division Multiple Access (FDMA), Orthogonal Frequency Division Multiple Access, OFDMA), Single-carrier Frequency Division Multiple Access (SC-FDMA) and other systems. The terms "system" and "network" in the embodiments of this application are often used interchangeably, and the described technology can be used not only for the above-mentioned systems and radio technologies, but also for other systems and radio technologies. The following description describes a New Radio (NR) system for example purposes, and NR terminology is used in much of the following description, but these techniques can also be applied to applications other than NR system applications, such as 6th generation Generation, 6G) communication system.
图1示出本申请实施例可应用的一种无线通信系统的框图。无线通信系统包括终端11和网络侧设备12。其中,终端11可以是手机、平板电脑(Tablet Personal Computer)、膝上型电脑(Laptop Computer)或称为笔记本电脑、个人数字助理(Personal Digital Assistant,PDA)、掌上电脑、上网本、超级移动个人计算机(ultra-mobile personal computer,UMPC)、移动上网装置(Mobile Internet Device,MID)、增强现实(augmented reality,AR)/虚拟现实(virtual reality,VR)设备、机器人、可穿戴式设备(Wearable Device)、车载设备(Vehicle User Equipment,VUE)、行人终端(Pedestrian User Equipment,PUE)、智能家居(具有无线通信功能的家居设备,如冰箱、电视、洗衣机或者家具等)、游戏机、个人计算机(personal computer,PC)、柜员机或者自助机等终端侧设备,可穿戴式设备包括:智能手表、智能手环、智能耳机、智能眼镜、智能首饰(智能手镯、智能手链、智能戒指、智能项链、智能脚镯、智能脚链等)、智能腕带、智能服装等。需要说明的是,在本申请实施例并不限定终端11的具体类型。网络侧设备12可以包括接入网设备或核心网设备,其中,接入网设备12也可以称为无线接入网设备、无线接入网(Radio Access Network,RAN)、无线接入网功能或无线接入网单元。接入网设备12可以包括基站、无线局域网(Wireless Local Area Network,WLAN)接入点或WiFi节点等,基站可被称为节点B、演进节点B(evolved Node B,eNB)、接入点、基收发机站(Base Transceiver Station,BTS)、无线电基站、无线电收发机、基本服务集(Basic Service Set,BSS)、扩展服务集(Extended Service Set,ESS)、家用B节点、家用演进型B节点、发送接收点(Transmitting  Receiving Point,TRP)或所述领域中其他某个合适的术语,只要达到相同的技术效果,所述基站不限于特定技术词汇,需要说明的是,在本申请实施例中仅以NR系统中的基站为例进行介绍,并不限定基站的具体类型。核心网设备可以包含但不限于如下至少一项:核心网节点、核心网功能、移动管理实体(Mobility Management Entity,MME)、接入移动管理功能(Access and Mobility Management Function,AMF)、会话管理功能(Session Management Function,SMF)、用户平面功能(User Plane Function,UPF)、策略控制功能(Policy Control Function,PCF)、策略与计费规则功能单元(Policy and Charging Rules Function,PCRF)、边缘应用服务发现功能(Edge Application Server Discovery Function,EASDF)、统一数据管理(Unified Data Management,UDM),统一数据仓储(Unified Data Repository,UDR)、归属用户服务器(Home Subscriber Server,HSS)、集中式网络配置(Centralized network configuration,CNC)、网络存储功能(Network Repository Function,NRF),网络开放功能(Network Exposure Function,NEF)、本地NEF(Local NEF,或L-NEF)、绑定支持功能(Binding Support Function,BSF)、应用功能(Application Function,AF)等。需要说明的是,在本申请实施例中仅以NR系统中的核心网设备为例进行介绍,并不限定核心网设备的具体类型。Figure 1 shows a block diagram of a wireless communication system to which embodiments of the present application are applicable. The wireless communication system includes a terminal 11 and a network side device 12. The terminal 11 may be a mobile phone, a tablet computer (Tablet Personal Computer), a laptop computer (Laptop Computer), or a notebook computer, a personal digital assistant (Personal Digital Assistant, PDA), a palmtop computer, a netbook, or a super mobile personal computer. (ultra-mobile personal computer, UMPC), mobile Internet device (Mobile Internet Device, MID), augmented reality (AR)/virtual reality (VR) equipment, robots, wearable devices (Wearable Device) , Vehicle User Equipment (VUE), Pedestrian User Equipment (PUE), smart home (home equipment with wireless communication functions, such as refrigerators, TVs, washing machines or furniture, etc.), game consoles, personal computers (personal computer, PC), teller machine or self-service machine and other terminal-side devices. Wearable devices include: smart watches, smart bracelets, smart headphones, smart glasses, smart jewelry (smart bracelets, smart bracelets, smart rings, smart necklaces, smart anklets) bracelets, smart anklets, etc.), smart wristbands, smart clothing, etc. It should be noted that the embodiment of the present application does not limit the specific type of the terminal 11. The network side device 12 may include an access network device or a core network device, where the access network device 12 may also be called a radio access network device, a radio access network (Radio Access Network, RAN), a radio access network function or Wireless access network unit. The access network device 12 may include a base station, a Wireless Local Area Network (WLAN) access point or a WiFi node, etc. The base station may be called a Node B, an evolved Node B (eNB), an access point, Base Transceiver Station (BTS), radio base station, radio transceiver, Basic Service Set (BSS), Extended Service Set (ESS), home B-node, home evolved B-node , sending and receiving points (Transmitting Receiving Point (TRP) or some other appropriate terminology in the field, as long as the same technical effect is achieved, the base station is not limited to specific technical terms. It should be noted that in the embodiment of this application, only TRP in the NR system is used. The base station is taken as an example for introduction, and the specific type of base station is not limited. Core network equipment may include but is not limited to at least one of the following: core network nodes, core network functions, mobility management entities (Mobility Management Entity, MME), access mobility management functions (Access and Mobility Management Function, AMF), session management functions (Session Management Function, SMF), User Plane Function (UPF), Policy Control Function (PCF), Policy and Charging Rules Function (PCRF), Edge Application Service Discovery function (Edge Application Server Discovery Function, EASDF), Unified Data Management (UDM), Unified Data Repository (UDR), Home Subscriber Server (HSS), centralized network configuration ( Centralized network configuration (CNC), Network Repository Function (NRF), Network Exposure Function (NEF), Local NEF (Local NEF, or L-NEF), Binding Support Function (Binding Support Function, BSF), application function (Application Function, AF), etc. It should be noted that in the embodiment of this application, only the core network equipment in the NR system is used as an example for introduction, and the specific type of the core network equipment is not limited.
下面结合附图,通过一些实施例及其应用场景对本申请实施例提供的设备数据路径管控方法、设备、终端及网络侧设备进行详细地说明。The device data path management and control method, device, terminal and network-side device provided by the embodiments of the present application will be described in detail below with reference to the accompanying drawings through some embodiments and application scenarios.
如图2或图3所示,本申请实施例提供了一种设备数据路径管控方法,该方法的执行主体为第一网络功能,换言之,该方法可以由安装在第一网络功能的软件或硬件来执行。所述方法包括以下步骤。As shown in Figure 2 or Figure 3, the embodiment of the present application provides a device data path management and control method. The execution subject of the method is the first network function. In other words, the method can be performed by software or hardware installed on the first network function. to execute. The method includes the following steps.
S310、第一网络功能从第二网络功能接收第一信息,所述第一信息包括规则信息和规则事件信息。S310. The first network function receives first information from the second network function, where the first information includes rule information and rule event information.
本申请实施例的设备数据路径管控系统通过管控第三设备203(也可以称为接入设备)接入到移动网络的数据路径来提高网络的安全性。以物联网为例,如图2所示,所述第三设备203所在数据网络可以为个人物联网(Personal IoT Networks,PIN),所述第三设备203可以为个人物联网设备(PIN Element,PINE),所述数据网络还包括第一设备201和第二设备202,所述第一设备201为与移动网络连接的具有网关功能的个人物联网设备(PIN Elements with Gateway Capability,PEGC),所述第二设备202为用于对第三设备进行管理的具有管理功能的个人物联网设备(PIN Elements with Management Capability,PEMC)。所述移动网络主要包括:第一网络功能211、第二网络功能212和第三网络功能213,其中,所述第一网络功能211可以为移动网络中的会话管理功能(Session Management Function,SMF), 所述第二网络功能212可以为与第三设备所在网络连接的个人物联网管理功能(PIN Management Function,PINMF),所述第二网络功能212还可以为网络开放功能(Network Exposure Function,NEF)或策略控制功能(Policy Control Function,PCF),所述第三网络功能213可以为用于执行用户面数据包的路由和转发的用户面功能(User Plane Function,UPF)。The device data path management and control system of the embodiment of the present application improves network security by managing and controlling the data path of the third device 203 (which may also be called an access device) accessing the mobile network. Taking the Internet of Things as an example, as shown in Figure 2, the data network where the third device 203 is located may be Personal IoT Networks (PIN), and the third device 203 may be a Personal IoT Device (PIN Element, PINE), the data network also includes a first device 201 and a second device 202. The first device 201 is a personal Internet of Things device (PIN Elements with Gateway Capability, PEGC) connected to the mobile network and has a gateway function, so The second device 202 is a personal Internet of Things device (PIN Elements with Management Capability, PEMC) with a management function for managing a third device. The mobile network mainly includes: a first network function 211, a second network function 212 and a third network function 213, where the first network function 211 may be a session management function (Session Management Function, SMF) in the mobile network. , The second network function 212 may be a personal IoT management function (PINMF) connected to the network where the third device is located, and the second network function 212 may also be a network exposure function (NEF). Or a policy control function (Policy Control Function, PCF), the third network function 213 may be a user plane function (User Plane Function, UPF) used to perform routing and forwarding of user plane data packets.
所述规则信息用于指示第三设备接入移动网络的数据路径的相关数据传输规则,所述规则信息可以包括中继规则信息和转发规则信息,所述中继规则信息用于指示所述第一设备转发移动网络与第三设备间的数据的规则,所述转发规则信息用于指示所述第三网络功能转发移动网络与数据网络间的数据的规则。在一种实施方式中,所述规则信息具体可以表现为路由信息(Routing Information,Routing Info),所述中继规则信息具体可以表现为设备与网间路由信息(Device to Network Routing Information,D2N Routing Info),所述转发规则信息具体可以表现为网间路由信息(Network Routing Information,Network Routing Info)。The rule information is used to indicate the relevant data transmission rules of the data path for the third device to access the mobile network. The rule information may include relay rule information and forwarding rule information. The relay rule information is used to indicate the third device. A device forwards a rule for data between a mobile network and a third device, and the forwarding rule information is used to instruct the third network function to forward a rule for data between a mobile network and a data network. In one implementation, the rule information can be specifically expressed as routing information (Routing Information, Routing Info), and the relay rule information can be specifically expressed as device and network routing information (Device to Network Routing Information, D2N Routing). Info), the forwarding rule information may be specifically expressed as inter-network routing information (Network Routing Information, Network Routing Info).
可选的,所述中继规则信息和所述转发规则信息包括以下至少一项:Optionally, the relay rule information and the forwarding rule information include at least one of the following:
上行数据过滤规则,具体表现为上行数据过滤器(Uplink packet filter,UL packet filter);Uplink data filtering rules, specifically expressed as uplink data filter (Uplink packet filter, UL packet filter);
下行数据过滤规则,具供表现为下行数据过滤器(Downlink packet filters,DL packet filter);Downlink data filtering rules, specifically expressed as downlink data filters (Downlink packet filters, DL packet filter);
上行数据转发规则;Upstream data forwarding rules;
下行数据转发规则。Downstream data forwarding rules.
所述规则事件信息用于指示所述规则信息的有效或无效条件,基于所述规则事件信息可以分别确定与中继规则信息对应的中继规则事件信息和与转发规则信息对应的转发规则事件信息,所述中继规则事件信息用于指示所述中继规则信息的有效或无效条件,所述转发规则事件信息用于指示所述转发规则信息的有效或无效条件。The rule event information is used to indicate the valid or invalid condition of the rule information. Based on the rule event information, the relay rule event information corresponding to the relay rule information and the forwarding rule event information corresponding to the forwarding rule information can be determined respectively. , the relay rule event information is used to indicate a valid or invalid condition of the relay rule information, and the forwarding rule event information is used to indicate a valid or invalid condition of the forwarding rule information.
可选的,所述规则事件信息包括与所述规则信息对应的以下至少一项:Optionally, the rule event information includes at least one of the following corresponding to the rule information:
持续时间信息(Duration)、有效时间信息、无效时间信息、违规访问指示、违规访问次数。Duration information (Duration), valid time information, invalid time information, illegal access instructions, and number of illegal accesses.
可选的,所述中继规则事件信息包括与所述中继规则信息对应的以下至少一项:Optionally, the relay rule event information includes at least one of the following corresponding to the relay rule information:
持续时间信息、有效时间信息、无效时间信息。Duration information, valid time information, invalid time information.
所述转发规则事件用于包括与所述转发规则信息对应的以下至少一项:The forwarding rule event is configured to include at least one of the following corresponding to the forwarding rule information:
持续时间信息、有效时间信息、无效时间信息、违规访问指示、违规访问次数。 Duration information, valid time information, invalid time information, illegal access instructions, and number of illegal accesses.
在一种实施方式中,所述基于所述规则事件信息,有效或无效所述转发规则信息的配置可以包括:In one implementation, the configuration of valid or invalid forwarding rule information based on the rule event information may include:
基于所述规则事件信息确定转发规则事件信息,并基于所述转发规则事件信息,有效或无效转发规则信息的配置。Forwarding rule event information is determined based on the rule event information, and based on the forwarding rule event information, valid or invalid forwarding rule information is configured.
所述转发规则事件信息的内容可以等同于规则事件信息的内容,即第一网络功能可直接将规则事件信息视为转发规则事件信息来确定转发规则信息的有效或无效条件,为了简便起见,在下面的实施例中均以规则事件信息来确定转发规则信息的有效或无效条件为例进行举例说明。The content of the forwarding rule event information may be equal to the content of the rule event information, that is, the first network function may directly regard the rule event information as the forwarding rule event information to determine the valid or invalid conditions for forwarding the rule information. For simplicity, in In the following embodiments, rule event information is used as an example to determine the valid or invalid conditions for forwarding rule information.
所述持续时间信息可以用于指示对应规则信息、中继规则信息或转发规则信息的有效期,所述有效期并不一定是所述持续时间信息规则的绝对期限,可以大于或小于所述持续时间信息规则的时间范围,也可以与持续时间信息规则的时间范围存在一定的偏差,比如有效期的起始时间在所述持续时间信息规则的时间范围内,而有效期的结束时间在所述持续时间信息规则的时间范围外。确定有效期是否有效的方式可以多种多样,例如,可以通过设置一个定时器,在定时器未超时的情况下确定有效期有效,而在定时器超时的情况下则确定有效期失效。The duration information may be used to indicate the validity period of the corresponding rule information, relay rule information or forwarding rule information. The validity period is not necessarily the absolute period of the duration information rule, and may be greater than or less than the duration information. The time range of the rule may also deviate from the time range of the duration information rule. For example, the starting time of the validity period is within the time range of the duration information rule, and the end time of the validity period is within the time range of the duration information rule. outside the time range. There can be various ways to determine whether the validity period is valid. For example, you can set a timer to determine that the validity period is valid if the timer does not expire, and determine that the validity period has expired if the timer times out.
所述有效时间信息可以用于指示对应规则信息、中继规则信息或转发规则信息有效的时间或时间范围。The valid time information may be used to indicate the valid time or time range of the corresponding rule information, relay rule information or forwarding rule information.
所述无效时间信息可以用于指示对应规则信息、中继规则信息或转发规则信息无效的时间或时间范围。The invalid time information may be used to indicate the time or time range when the corresponding rule information, relay rule information or forwarding rule information is invalid.
所述违规访问指示用于指示在检测到与规则信息或转发规则信息不匹配的数据的情况下,无效所述规则信息或转发规则信息。The violation access indication is used to indicate that when data that does not match the rule information or the forwarding rule information is detected, the rule information or the forwarding rule information is invalid.
所述违规访问次数用于指示在检测到与规则信息或转发规则信息不匹配的数据超过所述违规访问次数的情况下,无效所述规则信息或转发规则信息。The number of illegal accesses is used to indicate that when data that does not match the rule information or forwarding rule information is detected and exceeds the number of illegal accesses, the rule information or the forwarding rule information is invalidated.
在第三设备需要接入移动网络时,所述第三设备可以通过第二设备和/或第三设备向第二网络功能发送数据转发请求。具体地,第三设备可以向第一设备或第二设备发送第三信息,所述第三信息可以包括数据转发的规则事件信息;其中,所述规则事件信息用于指示确定所述数据转发有效或失效的相关信息。第二设备根据第三信息向第二网络功能发送第四信息,所述第四信息包括数据转发的规则事件信息。所述第二网络功能根据第四信息向第一网络功能发送第一信息。When the third device needs to access the mobile network, the third device may send a data forwarding request to the second network function through the second device and/or the third device. Specifically, the third device may send third information to the first device or the second device, and the third information may include rule event information for data forwarding; wherein the rule event information is used to indicate that it is determined that the data forwarding is valid. or invalid information. The second device sends fourth information to the second network function according to the third information, where the fourth information includes rule event information for data forwarding. The second network function sends the first information to the first network function according to the fourth information.
应理解的是,所述规则事件信息的确定方式可以多种多样,在一种实施方式中,所述规则事件信息可以由第一设备提供;在另一种实施方式中,所述规则事件信息可以由第二设备提供或者基于第一设备发送的规则事件信息来确定或调整;在另一种实施方式中,所述规则事件信息还可以由第二网络 功能基于本地策略和/或第二设备发送的规则事件信息来确定。It should be understood that the rule event information can be determined in various ways. In one implementation, the rule event information can be provided by the first device; in another implementation, the rule event information It may be provided by the second device or determined or adjusted based on the rule event information sent by the first device; in another implementation manner, the rule event information may also be provided by the second network Functionality is determined based on local policy and/or rule event information sent by the second device.
S320、根据所述第一信息,所述第一网络功能执行以下至少一项:S320. According to the first information, the first network function performs at least one of the following:
基于所述规则信息,向第一设备发送中继规则信息;Based on the rule information, send relay rule information to the first device;
基于所述规则事件信息,向第一设备发送中继规则事件信息;Based on the rule event information, send relay rule event information to the first device;
基于所述规则信息,向第三网络功能配置转发规则信息,用于使所述第三网络功能转发移动网络与第三设备间的数据;Based on the rule information, configure forwarding rule information to a third network function to enable the third network function to forward data between the mobile network and the third device;
基于所述规则事件信息,有效或无效所述转发规则信息的配置;Validate or invalidate the configuration of the forwarding rule information based on the rule event information;
其中,所述第三设备为通过所述第一设备接收来自移动网络侧的数据或向移动网络侧发送数据的设备。Wherein, the third device is a device that receives data from the mobile network side or sends data to the mobile network side through the first device.
在所述第一设备在从移动网络侧,即从第一网络功能获取到中继规则信息和中继规则事件信息后,可以执行以下至少一项:After the first device obtains the relay rule information and the relay rule event information from the mobile network side, that is, from the first network function, it may perform at least one of the following:
基于所述中继规则信息转发所述移动网络与第三设备间的数据;Forward data between the mobile network and the third device based on the relay rule information;
基于所述中继规则事件信息,有效或无效所述中继规则信息。Based on the relay rule event information, the relay rule information is valid or invalid.
在一种实施方式中,在所述中继规则事件信息包括持续时间信息的情况下,所述基于所述中继规则事件信息,有效或无效所述中继规则信息,包括以下至少一项:In one implementation, when the relay rule event information includes duration information, the valid or invalid relay rule information based on the relay rule event information includes at least one of the following:
在基于所述持续时间信息确定的有效期有效的情况下,所述第一设备启用所述中继规则信息;If the validity period determined based on the duration information is valid, the first device enables the relay rule information;
在基于所述持续时间信息确定的有效期失效的情况下,所述第一设备停用所述中继规则信息。In the event that the validity period determined based on the duration information expires, the first device deactivates the relay rule information.
在另一种实施方式中,在所述中继规则事件信息包括有效时间信息的情况下,所述基于所述中继规则事件信息,有效或无效所述中继规则信息,包括:In another implementation, when the relay rule event information includes valid time information, the valid or invalid relay rule information based on the relay rule event information includes:
在当前时间到达所述有效时间信息确定的时间或时间范围的情况下,所述第一设备启用所述中继规则信息。When the current time reaches the time or time range determined by the valid time information, the first device enables the relay rule information.
在另一种实施方式中,在所述中继规则事件信息包括中继无效时间信息的情况下,所述基于所述中继规则事件信息,有效或无效所述中继规则信息,包括:In another embodiment, when the relay rule event information includes relay invalidation time information, validating or invalidating the relay rule information based on the relay rule event information includes:
在当前时间到达所述中继无效时间信息确定的时间或时间范围的情况下,所述第一设备停用所述中继规则信息。When the current time reaches the time or time range determined by the relay invalid time information, the first device deactivates the relay rule information.
所述第一网络功能在向第三网络功能配置转发规则信息后,可基于所述规则事件信息包括的相关信息,有效或无效所述转发规则信息的配置。After the first network function configures the forwarding rule information to the third network function, the configuration of the forwarding rule information can be valid or invalid based on the relevant information included in the rule event information.
在一种实施方式中,在所述规则事件信息包括持续时间信息的情况下,所述基于所述规则事件信息,有效或无效所述转发规则信息的配置,包括以下至少一项: In one implementation, when the rule event information includes duration information, the configuration of valid or invalid forwarding rule information based on the rule event information includes at least one of the following:
在基于所述持续时间信息确定的有效期有效的情况下,所述第一网络功能向所述第三网络功能指示所述转发规则信息有效;If the validity period determined based on the duration information is valid, the first network function indicates to the third network function that the forwarding rule information is valid;
在基于所述持续时间信息确定的有效期失效的情况下,所述第一网络功能向所述第三网络功能指示所述转发规则信息失效,例如指示删除或指示无效所述转发规则信息。In the event that the validity period determined based on the duration information expires, the first network function indicates to the third network function that the forwarding rule information is invalid, for example, instructs to delete or invalidates the forwarding rule information.
在另一种实施方式中,在所述规则事件信息包括有效时间信息的情况下,所述基于所述规则事件信息,有效或无效所述转发规则信息的配置,包括:In another implementation, when the rule event information includes valid time information, the configuration of valid or invalid forwarding rule information based on the rule event information includes:
在当前时间到达所述有效时间信息确定的时间或时间范围的情况下,所述第一网络功能向所述第三网络功能指示所述转发规则信息有效。When the current time reaches the time or time range determined by the valid time information, the first network function indicates to the third network function that the forwarding rule information is valid.
在另一种实施方式中,在所述规则事件信息包括无效时间信息的情况下,所述基于所述规则事件信息,有效或无效所述转发规则信息的配置,包括:In another implementation, when the rule event information includes invalid time information, the configuration of valid or invalid forwarding rule information based on the rule event information includes:
在当前时间到达所述无效时间信息确定的时间或时间范围的情况下,所述第一网络功能向所述第三网络功能指示所述转发规则信息无效。When the current time reaches the time or time range determined by the invalid time information, the first network function indicates to the third network function that the forwarding rule information is invalid.
在另一种实施方式中,在所述规则事件信息包括违规访问指示的情况下,所述基于所述规则事件信息,有效或无效所述转发规则信息的配置,包括:In another implementation, when the rule event information includes a violation access indication, the configuration of valid or invalid forwarding rule information based on the rule event information includes:
在检测到与所述规则信息不匹配的数据的情况下,所述第一网络功能向所述第三网络功能指示所述转发规则信息无效。In the event that data that does not match the rule information is detected, the first network function indicates to the third network function that the forwarding rule information is invalid.
在另一种实施方式中,在所述规则事件信息包括违规访问次数的情况下,所述基于所述规则事件信息,有效或无效所述转发规则信息的配置,包括:In another embodiment, when the rule event information includes the number of access violations, the configuration of valid or invalid forwarding rule information based on the rule event information includes:
在检测到与所述规则信息不匹配的数据超过所述违规访问次数的情况下,所述第一网络功能向所述第三网络功能指示所述转发规则信息无效。When it is detected that data that does not match the rule information exceeds the number of illegal accesses, the first network function indicates to the third network function that the forwarding rule information is invalid.
可选的,在所述规则事件信息包括违规访问指示和/或违规访问次数的情况下,在检测到与所述规则信息不匹配的数据的情况下或者在检测到与所述规则信息不匹配的数据超过所述违规访问次数的情况下,所述方法还包括:Optionally, when the rule event information includes a violation access indication and/or a violation access count, when data that does not match the rule information is detected or when data that does not match the rule information is detected. In the case where the data exceeds the number of illegal accesses, the method also includes:
所述第一网络功能向第一设备发送终止中继指示,所述终止中继指示用于指示所述第一设备终止转发移动网络与所述第三设备间的数据。The first network function sends a termination relay indication to the first device, where the termination relay indication is used to instruct the first device to terminate forwarding data between the mobile network and the third device.
所述第一设备在接收到所述终止中继指示后,基于所述终止中继指示,终止转发移动网络与第三设备间的数据。After receiving the relay termination indication, the first device terminates forwarding data between the mobile network and the third device based on the relay termination indication.
基于上述实施例,如图4所示,本申请实施给出了设备数据路径管控方法的一种信令流程:Based on the above embodiment, as shown in Figure 4, this application implements a signaling process of a device data path management and control method:
A1.PINE向PEGC或PEMC发送第三信息,具体可以包括:A1.PINE sends third information to PEGC or PEMC, which may include:
PINE先建立与PEGC之间的直接连接,向PEGC发送承载第三信息的远程供应请求(Remote Provisioning Request),所述第三信息可以包括:个人物联网标识(PIN Identifier,PIN ID),PINE标识(PINE ID)和规则事件信息,所述规则事件信息以Duration为例; PINE first establishes a direct connection with PEGC and sends a remote provisioning request (Remote Provisioning Request) carrying third information to PEGC. The third information may include: personal Internet of Things identifier (PIN Identifier, PIN ID), PINE identifier (PINE ID) and rule event information. The rule event information takes Duration as an example;
PEGC可以直接向PEMC发送Remote Provisioning Request;PEGC也可以先向PINMF发送PEMC的通知消息(PEMC Notification),所述PEMC Notification包括PEGC标识(PEGC ID)和Remote Provisioning Request,再由PINMF向所述PEMC发送PEMC Notification。PEGC can directly send a Remote Provisioning Request to PEMC; PEGC can also first send a PEMC notification message (PEMC Notification) to PINMF. The PEMC Notification includes a PEGC identification (PEGC ID) and a Remote Provisioning Request, and then PINMF sends it to the PEMC. PEMC Notification.
A2.PEMC向PINMF发送承载第四信息的Remote Provisioning Request,所述第四信息可以包括PIN ID、PINE ID、PEMC标识(PEMC ID)、PEGC ID和Duration;其中,所述PEMC可以调整从步骤A1接收到的Duration。A2. PEMC sends a Remote Provisioning Request carrying fourth information to PINMF. The fourth information may include PIN ID, PINE ID, PEMC ID (PEMC ID), PEGC ID and Duration; wherein, the PEMC may be adjusted from step A1 Duration received.
A3-A4.PINMF向SMF发送第一信息,具体可以包括:A3-A4.PINMF sends the first information to SMF, which may include:
PINMF通过N5交互协议或NEF向PCF发送承载第一信息的Remote Provisioning Request,所述第一信息可以包括:可选的用户永久标识(Subscription Permanent Identifier,SUPI)或通用公共用户标识(Generic Public Subscription Identifier,GPSI),终端地址(UE address),可选的数据网络名称(Data Network Name,DNN)或切片相关信息(比如单网络切片选择辅助信息(Single Network Slice Selection Assistance Information,S-NSSAI)、网络切片标识(Network Slice Instance,NSI)),PIN ID,PINE ID,设备与网间路由信息(Device to Network Routing Information,D2N Routing Info),上行包过滤器(UL Packet filters),下行包过滤器(DL Packet filters)和Duration。PINMF可基于本地策略决定Duration。所述D2N Routing Info and DL Packet filters可基于PINE产生;PINMF sends a Remote Provisioning Request carrying the first information to the PCF through the N5 interaction protocol or NEF. The first information may include: optional User Permanent Identifier (Subscription Permanent Identifier, SUPI) or Generic Public User Identifier (Generic Public Subscription Identifier) , GPSI), terminal address (UE address), optional data network name (Data Network Name, DNN) or slice related information (such as Single Network Slice Selection Assistance Information (S-NSSAI), network Slice identification (Network Slice Instance, NSI)), PIN ID, PINE ID, device and inter-network routing information (Device to Network Routing Information, D2N Routing Info), uplink packet filters (UL Packet filters), downlink packet filters ( DL Packet filters) and Duration. PINMF can determine Duration based on local policies. The D2N Routing Info and DL Packet filters can be generated based on PINE;
PCF向SMF发送承载第一信息的Remote Provisioning Request。PCF sends a Remote Provisioning Request carrying the first information to SMF.
A5.SMF与UPF进行交互,向UPF配置转发规则信息。A5.SMF interacts with UPF and configures forwarding rule information to UPF.
A6.SMF与PEGC执行协议数据单元会话修改(Protocol Data Unit Session Modification,PDU Session Modification),并通过N1消息向PEGC发送第二信息,所述第二信息可以包括PIN ID、PINE ID、D2N Routing Info和Duration。A6.SMF and PEGC perform Protocol Data Unit Session Modification (PDU Session Modification), and send second information to PEGC through the N1 message. The second information may include PIN ID, PINE ID, and D2N Routing Info. and Duration.
A7.-A10 SMF向PCF发送反馈信息,PCF向PINMF发送反馈信息,PINMF向PEMC发送反馈信息,PEMC向PINE发送反馈信息。A7.-A10 SMF sends feedback information to PCF, PCF sends feedback information to PINMF, PINMF sends feedback information to PEMC, and PEMC sends feedback information to PINE.
至此,PINE可以通过移动网络与供应服务器(provision server)进行交互,所述供应服务器可以由第三方(3rd party)设备或处理器管理。At this point, PINE can interact with the provision server through the mobile network, and the provision server can be managed by a 3rd party device or processor.
A11当基于Duration的有效期失效后,SMF与UPF进行交互,并指示失效转发规则信息;相应地,PEGC也将失效中继规则信息。A11 When the validity period based on Duration expires, SMF interacts with UPF and instructs the invalid forwarding rule information; accordingly, PEGC will also invalidate the relay rule information.
由上述实施例技术方案可知,本申请实施例通过从第二网络功能接收第一信息,所述第一信息包括规则信息和规则事件信息;并根据所述第一信息执行以下至少一项:基于所述规则信息,向第一设备发送中继规则信息;基于所述规则事件信息,向第一设备发送中继规则事件信息;基于所述规则信 息,向第三网络功能配置转发规则信息;基于所述规则事件信息,有效或无效所述转发规则信息的配置,从而可以根据规则事件信息对第三设备与移动网络的数据路径进行有效管控,提高移动网络的安全性。It can be seen from the technical solutions of the above embodiments that the embodiments of the present application receive first information from the second network function, where the first information includes rule information and rule event information; and perform at least one of the following based on the first information: based on The rule information sends relay rule information to the first device; based on the rule event information, sends relay rule event information to the first device; based on the rule information information, and configure the forwarding rule information to the third network function; based on the rule event information, the configuration of the forwarding rule information is valid or invalid, so that the data path between the third device and the mobile network can be effectively controlled according to the rule event information, Improve mobile network security.
本申请实施例提供的设备数据路径管控方法,执行主体可以为设备数据路径管控装置。本申请实施例中以设备数据路径管控装置执行设备数据路径管控方法为例,说明本申请实施例提供的设备数据路径管控装置。For the device data path management and control method provided by the embodiments of the present application, the execution subject may be a device data path management and control device. In the embodiments of this application, the device data path management and control device performing the device data path management and control method is used as an example to illustrate the device data path management and control device provided by the embodiments of this application.
如图5所示,所述设备数据路径管控装置包括:第一传输模块501和第一执行模块502。As shown in Figure 5, the device data path management and control device includes: a first transmission module 501 and a first execution module 502.
所述第一传输模块501用于从第二网络功能接收第一信息,所述第一信息包括规则信息和规则事件信息;所述第一执行模块502用于根据所述第一信息执行以下至少一项:The first transmission module 501 is configured to receive first information from a second network function, where the first information includes rule information and rule event information; the first execution module 502 is configured to perform at least the following based on the first information: One item:
基于所述规则信息,向第一设备发送中继规则信息;Based on the rule information, send relay rule information to the first device;
基于所述规则事件信息,向第一设备发送中继规则事件信息;Based on the rule event information, send relay rule event information to the first device;
基于所述规则信息,向第三网络功能配置转发规则信息;Based on the rule information, forward the rule information to a third network function configuration;
基于所述规则事件信息,有效或无效所述转发规则信息的配置;Validate or invalidate the configuration of the forwarding rule information based on the rule event information;
其中,所述中继规则信息用于指示所述第一设备转发移动网络与第三设备间的数据的规则,所述转发规则信息用于指示所述第三网络功能转发移动网络与数据网络间的数据的规则,所述规则事件信息用于指示所述规则信息的有效或无效条件,所述中继规则事件信息用于指示所述中继规则信息的有效或无效条件,所述第三设备为通过所述第一设备接收来自移动网络侧的数据或向移动网络侧发送数据的设备。Wherein, the relay rule information is used to instruct the first device to forward the rules of data between the mobile network and the third device, and the forwarding rule information is used to instruct the third network function to forward the data between the mobile network and the data network. rules for data, the rule event information is used to indicate the valid or invalid condition of the rule information, the relay rule event information is used to indicate the valid or invalid condition of the relay rule information, the third device It is a device that receives data from the mobile network side or sends data to the mobile network side through the first device.
可选的,所述规则事件信息包括与所述转发规则信息对应的以下至少一项:Optionally, the rule event information includes at least one of the following corresponding to the forwarding rule information:
持续时间信息、有效时间信息、无效时间信息、违规访问指示、违规访问次数。Duration information, valid time information, invalid time information, illegal access instructions, and number of illegal accesses.
可选的,所述中继规则事件信息包括与所述中继规则信息对应的以下至少一项:Optionally, the relay rule event information includes at least one of the following corresponding to the relay rule information:
持续时间信息、有效时间信息、无效时间信息。Duration information, valid time information, invalid time information.
可选的,在所述规则事件信息包括持续时间信息的情况下,所述第一执行模块502用于执行以下至少一项:Optionally, in the case where the rule event information includes duration information, the first execution module 502 is configured to perform at least one of the following:
在基于所述持续时间信息确定的有效期有效的情况下,向所述第三网络功能指示所述转发规则信息有效;If the validity period determined based on the duration information is valid, indicate to the third network function that the forwarding rule information is valid;
在基于所述持续时间信息确定的有效期失效的情况下,向所述第三网络功能指示所述转发规则信息失效。In the event that the validity period determined based on the duration information expires, indicating to the third network function that the forwarding rule information expires.
可选的,在所述规则事件信息包括有效时间信息的情况下,所述第一执 行模块502用于在当前时间到达所述有效时间信息确定的时间或时间范围的情况下,向所述第三网络功能指示所述转发规则信息有效。Optionally, when the rule event information includes valid time information, the first execution The line module 502 is configured to indicate to the third network function that the forwarding rule information is valid when the current time reaches the time or time range determined by the valid time information.
可选的,在所述规则事件信息包括无效时间信息的情况下,所述第一执行模块502用于在当前时间到达所述无效时间信息确定的时间或时间范围的情况下,向所述第三网络功能指示所述转发规则信息无效。Optionally, in the case where the rule event information includes invalid time information, the first execution module 502 is configured to send a request to the third execution module when the current time reaches the time or time range determined by the invalid time information. Three network functions indicate that the forwarding rule information is invalid.
可选的,在所述规则事件信息包括违规访问指示的情况下,所述第一执行模块502用于在检测到与所述规则信息不匹配的数据的情况下,向所述第三网络功能指示所述转发规则信息无效。Optionally, when the rule event information includes a violation access indication, the first execution module 502 is configured to report data to the third network function when data that does not match the rule information is detected. Indicates that the forwarding rule information is invalid.
可选的,在所述规则事件信息包括违规访问次数的情况下,所述第一执行模块502用于在检测到与所述规则信息不匹配的数据超过所述违规访问次数的情况下,向所述第三网络功能指示所述转发规则信息无效。Optionally, in the case where the rule event information includes the number of illegal accesses, the first execution module 502 is configured to, if it detects that data that does not match the rule information exceeds the number of illegal accesses, The third network function indicates that the forwarding rule information is invalid.
可选的,在所述规则事件信息包括违规访问指示和/或违规访问次数的情况下,所述第一执行模块502还用于向第一设备发送终止中继指示,所述终止中继指示用于指示所述第一设备终止转发移动网络与所述第三设备间的数据。Optionally, in the case where the rule event information includes a violation access indication and/or a violation access count, the first execution module 502 is also configured to send a termination relay indication to the first device, where the termination relay indication Used to instruct the first device to terminate forwarding data between the mobile network and the third device.
可选的,所述中继规则信息和所述转发规则信息包括以下至少一项:Optionally, the relay rule information and the forwarding rule information include at least one of the following:
上行数据过滤规则;Upstream data filtering rules;
下行数据过滤规则;Downstream data filtering rules;
上行数据转发规则;Upstream data forwarding rules;
下行数据转发规则。Downstream data forwarding rules.
由上述实施例技术方案可知,本申请实施例通过从第二网络功能接收第一信息,所述第一信息包括规则信息和规则事件信息;并根据所述第一信息执行以下至少一项:基于所述规则信息,向第一设备发送中继规则信息;基于所述规则事件信息,向第一设备发送中继规则事件信息;基于所述规则信息,向第三网络功能配置转发规则信息;基于所述规则事件信息,有效或无效所述转发规则信息的配置,从而可以根据规则事件信息对第三设备与移动网络的数据路径进行有效管控,提高移动网络的安全性。It can be seen from the technical solutions of the above embodiments that the embodiments of the present application receive first information from the second network function, where the first information includes rule information and rule event information; and perform at least one of the following based on the first information: based on The rule information sends relay rule information to the first device; based on the rule event information, sends relay rule event information to the first device; based on the rule information, forwards the rule information to a third network function configuration; based on The rule event information is a configuration of valid or invalid forwarding rule information, so that the data path between the third device and the mobile network can be effectively managed and controlled based on the rule event information, thereby improving the security of the mobile network.
本申请实施例中的设备数据路径管控装置可以是电子设备,例如具有操作系统的电子设备,也可以是电子设备中的部件,例如集成电路或芯片。该电子设备可以是终端,也可以为除终端之外的其他设备。示例性的,终端可以包括但不限于上述所列举的终端11的类型,其他设备可以为服务器、网络附属存储器(Network Attached Storage,NAS)等,本申请实施例不作具体限定。The device data path management and control device in the embodiment of the present application may be an electronic device, such as an electronic device with an operating system, or may be a component in the electronic device, such as an integrated circuit or chip. The electronic device may be a terminal or other devices other than the terminal. For example, terminals may include but are not limited to the types of terminals 11 listed above, and other devices may be servers, network attached storage (Network Attached Storage, NAS), etc., which are not specifically limited in the embodiment of this application.
本申请实施例提供的设备数据路径管控装置能够实现图3至图4的方法实施例实现的各个过程,并达到相同的技术效果,为避免重复,这里不再赘 述。The equipment data path management and control device provided by the embodiment of the present application can implement each process implemented by the method embodiment of Figures 3 to 4, and achieve the same technical effect. To avoid duplication, no details will be given here. narrate.
如图6所示,本申请实施例提供一种设备数据路径管控方法,该方法的执行主体为第一设备,换言之,该方法可以由安装在第一设备的软件或硬件来执行。所述方法包括以下步骤。As shown in Figure 6, this embodiment of the present application provides a device data path management and control method. The execution subject of the method is the first device. In other words, the method can be executed by software or hardware installed on the first device. The method includes the following steps.
S610、第一设备从移动网络侧接收第二信息,所述第二信息包括以下至少一项:中继规则信息和中继规则事件信息;终止中继指示;S610. The first device receives second information from the mobile network side, where the second information includes at least one of the following: relay rule information and relay rule event information; termination of relay instruction;
S620、根据所述第二信息,所述第一设备执行以下至少一项:S620. According to the second information, the first device performs at least one of the following:
基于所述中继规则信息转发所述移动网络与第三设备间的数据;Forward data between the mobile network and the third device based on the relay rule information;
基于所述中继规则事件信息,有效或无效所述中继规则信息;Validate or invalidate the relay rule information based on the relay rule event information;
基于所述终止中继指示,终止转发移动网络与第三设备间的数据;其中,所述第三设备为通过所述第一设备接收来自移动网络侧的数据或向移动网络侧发送数据的设备。Based on the termination relay indication, terminate the forwarding of data between the mobile network and the third device; wherein the third device is a device that receives data from the mobile network side or sends data to the mobile network side through the first device. .
可选的,所述中继规则事件信息包括与所述中继规则信息对应的以下至少一项:Optionally, the relay rule event information includes at least one of the following corresponding to the relay rule information:
持续时间信息;有效时间信息;无效时间信息。Duration information; valid time information; invalid time information.
可选的,在所述中继规则事件信息包括持续时间信息的情况下,所述基于所述中继规则事件信息,有效或无效所述中继规则信息,包括以下至少一项:Optionally, in the case where the relay rule event information includes duration information, the valid or invalid relay rule information based on the relay rule event information includes at least one of the following:
在基于所述持续时间信息确定的有效期有效的情况下,所述第一设备启用所述中继规则信息;If the validity period determined based on the duration information is valid, the first device enables the relay rule information;
在基于所述持续时间信息确定的有效期失效的情况下,所述第一设备停用所述中继规则信息。In the event that the validity period determined based on the duration information expires, the first device deactivates the relay rule information.
可选的,在所述中继规则事件信息包括有效时间信息的情况下,所述基于所述中继规则事件信息,有效或无效所述中继规则信息,包括:Optionally, in the case where the relay rule event information includes valid time information, the valid or invalid relay rule information based on the relay rule event information includes:
在当前时间到达所述有效时间信息确定的时间或时间范围的情况下,所述第一设备启用所述中继规则信息。When the current time reaches the time or time range determined by the valid time information, the first device enables the relay rule information.
可选的,在所述中继规则事件信息包括中继无效时间信息的情况下,所述基于所述中继规则事件信息,有效或无效所述中继规则信息,包括:Optionally, in the case where the relay rule event information includes relay invalidation time information, validating or invalidating the relay rule information based on the relay rule event information includes:
在当前时间到达所述中继无效时间信息确定的时间或时间范围的情况下,所述第一设备停用所述中继规则信息。When the current time reaches the time or time range determined by the relay invalid time information, the first device deactivates the relay rule information.
可选的,所述中继规则信息包括以下至少一项:Optionally, the relay rule information includes at least one of the following:
上行数据过滤规则;Upstream data filtering rules;
下行数据过滤规则;Downstream data filtering rules;
上行数据转发规则;Upstream data forwarding rules;
下行数据转发规则。 Downstream data forwarding rules.
可选的,在第一设备从移动网络侧接收第二信息之前,所述方法还包括:Optionally, before the first device receives the second information from the mobile network side, the method further includes:
向第二设备或第二网络功能发送第四信息,所述第四信息包括数据转发的规则事件信息。Send fourth information to the second device or the second network function, where the fourth information includes rule event information for data forwarding.
可选的,所述规则事件信息从所述第三设备接收。Optionally, the rule event information is received from the third device.
可选的,所述规则事件信息包括以下至少一项:Optionally, the rule event information includes at least one of the following:
持续时间信息、有效时间信息、无效时间信息、违规访问指示、违规访问次数。Duration information, valid time information, invalid time information, illegal access instructions, and number of illegal accesses.
可选的,所述违规访问指示用于指示在检测到与规则信息不匹配的数据的情况下,指示所述第一设备终止转发移动网络与第三设备间的数据。Optionally, the violation access indication is used to instruct the first device to terminate forwarding data between the mobile network and the third device when data that does not match the rule information is detected.
可选的,所述违规访问次数用于指示在检测到与规则信息不匹配的数据超过所述违规访问次数的情况下,指示所述第一设备终止转发移动网络与第三设备间的数据。Optionally, the number of illegal accesses is used to instruct the first device to terminate forwarding data between the mobile network and the third device when detecting data that does not match the rule information exceeds the number of illegal accesses.
步骤S610-S620可以实现如图3-4所示的方法实施例,并得到相同的技术效果,重复部分此处不再赘述。Steps S610-S620 can implement the method embodiment shown in Figure 3-4 and obtain the same technical effect, and the repeated parts will not be described again here.
由上述实施例的技术方案可知,本申请实施例通过从移动网络侧接收第二信息,所述第二信息包括以下至少一项:中继规则信息和中继规则事件信息;终止中继指示;并根据所述第二信息执行以下至少一项:基于所述中继规则信息转发所述移动网络与第三设备间的数据;基于所述中继规则事件信息,有效或无效所述中继规则信息;基于所述终止中继指示,终止转发移动网络与第三设备间的数据,从而可以根据规则事件信息对第三设备与移动网络的数据路径进行有效管控,提高移动网络的安全性。It can be known from the technical solutions of the above embodiments that the embodiments of the present application receive second information from the mobile network side, and the second information includes at least one of the following: relay rule information and relay rule event information; termination of relay instructions; and perform at least one of the following according to the second information: forward data between the mobile network and the third device based on the relay rule information; valid or invalidate the relay rule based on the relay rule event information Information; based on the termination relay indication, the forwarding of data between the mobile network and the third device is terminated, so that the data path between the third device and the mobile network can be effectively controlled according to the rule event information, and the security of the mobile network can be improved.
本申请实施例提供的设备数据路径管控方法,执行主体可以为设备数据路径管控装置。本申请实施例中以设备数据路径管控装置执行设备数据路径管控方法为例,说明本申请实施例提供的设备数据路径管控装置。For the device data path management and control method provided by the embodiments of the present application, the execution subject may be a device data path management and control device. In the embodiments of this application, the device data path management and control device performing the device data path management and control method is used as an example to illustrate the device data path management and control device provided by the embodiments of this application.
如图7所示,所述设备数据路径管控装置包括:第二传输模块701和第二执行模块702。As shown in Figure 7, the device data path management and control device includes: a second transmission module 701 and a second execution module 702.
所述第二传输模块701用于从移动网络侧接收第二信息,所述第二信息包括以下至少一项:中继规则信息和中继规则事件信息;终止中继指示;所述第二执行模块702用于根据所述第二信息执行以下至少一项:The second transmission module 701 is used to receive second information from the mobile network side. The second information includes at least one of the following: relay rule information and relay rule event information; termination of relay instructions; the second execution Module 702 is configured to perform at least one of the following according to the second information:
基于所述中继规则信息转发所述移动网络与第三设备间的数据;Forward data between the mobile network and the third device based on the relay rule information;
基于所述中继规则事件信息,有效或无效所述中继规则信息;Validate or invalidate the relay rule information based on the relay rule event information;
基于所述终止中继指示,终止转发移动网络与第三设备间的数据;其中,所述第三设备为通过所述设备接入管控装置接收来自移动网络侧的数据或向移动网络侧发送数据的设备。Based on the termination relay indication, terminate the forwarding of data between the mobile network and the third device; wherein the third device receives data from the mobile network side or sends data to the mobile network side through the device access management and control device. device of.
可选的,所述中继规则事件信息包括与所述中继规则信息对应的以下至 少一项:Optionally, the relay rule event information includes the following: One item missing:
持续时间信息;有效时间信息;无效时间信息。Duration information; valid time information; invalid time information.
可选的,在所述中继规则事件信息包括持续时间信息的情况下,所述第二执行模块702用于执行以下至少一项:Optionally, in the case where the relay rule event information includes duration information, the second execution module 702 is configured to perform at least one of the following:
在基于所述持续时间信息确定的有效期有效的情况下,启用所述中继规则信息;If the validity period determined based on the duration information is valid, enable the relay rule information;
在基于所述持续时间信息确定的有效期失效的情况下,停用所述中继规则信息。In the event that the validity period determined based on the duration information expires, the relay rule information is deactivated.
可选的,在所述中继规则事件信息包括有效时间信息的情况下,所述第二执行模块702用于在当前时间到达所述有效时间信息确定的时间或时间范围的情况下,启用所述中继规则信息。Optionally, in the case where the relay rule event information includes valid time information, the second execution module 702 is configured to enable all the events when the current time reaches the time or time range determined by the valid time information. Describe relay rule information.
可选的,在所述中继规则事件信息包括中继无效时间信息的情况下,第二执行模块702用于在当前时间到达所述中继无效时间信息确定的时间或时间范围的情况下,停用所述中继规则信息。Optionally, when the relay rule event information includes relay invalidation time information, the second execution module 702 is configured to: when the current time reaches the time or time range determined by the relay invalidation time information, Disable the relay rule information.
可选的,所述中继规则信息包括以下至少一项:Optionally, the relay rule information includes at least one of the following:
上行数据过滤规则;Upstream data filtering rules;
下行数据过滤规则;Downstream data filtering rules;
上行数据转发规则;Upstream data forwarding rules;
下行数据转发规则。Downstream data forwarding rules.
可选的,在第一设备从移动网络侧接收第二信息之前,第二传输模块701还用于向第二设备或第二网络功能发送第四信息,所述第四信息包括数据转发的规则事件信息。Optionally, before the first device receives the second information from the mobile network side, the second transmission module 701 is also configured to send fourth information to the second device or the second network function, where the fourth information includes rules for data forwarding. event information.
可选的,所述规则事件信息从所述第三设备接收。Optionally, the rule event information is received from the third device.
可选的,所述规则事件信息包括以下至少一项:Optionally, the rule event information includes at least one of the following:
持续时间信息、有效时间信息、无效时间信息、违规访问指示、违规访问次数。Duration information, valid time information, invalid time information, illegal access instructions, and number of illegal accesses.
可选的,所述违规访问指示用于指示在检测到与规则信息不匹配的数据的情况下,终止转发移动网络与第三设备间的数据。Optionally, the illegal access indication is used to instruct to terminate the forwarding of data between the mobile network and the third device when data that does not match the rule information is detected.
可选的,所述违规访问次数用于指示在检测到与规则信息不匹配的数据超过所述违规访问次数的情况下,终止转发移动网络与第三设备间的数据。Optionally, the number of illegal accesses is used to indicate that when data that does not match the rule information is detected to exceed the number of illegal accesses, the forwarding of data between the mobile network and the third device is terminated.
由上述实施例的技术方案可知,本申请实施例通过从移动网络侧接收第二信息,所述第二信息包括以下至少一项:中继规则信息和中继规则事件信息;终止中继指示;并根据所述第二信息执行以下至少一项:基于所述中继规则信息转发所述移动网络与第三设备间的数据;基于所述中继规则事件信息,有效或无效所述中继规则信息;基于所述终止中继指示,终止转发移动 网络与第三设备间的数据,从而可以根据规则事件信息对第三设备与移动网络的数据路径进行有效管控,提高移动网络的安全性。It can be known from the technical solutions of the above embodiments that the embodiments of the present application receive second information from the mobile network side, and the second information includes at least one of the following: relay rule information and relay rule event information; termination of relay instructions; and perform at least one of the following according to the second information: forward data between the mobile network and the third device based on the relay rule information; valid or invalidate the relay rule based on the relay rule event information information; based on the termination relay indication, terminate the forwarding movement The data between the network and the third device can effectively control the data path between the third device and the mobile network based on rule event information, thereby improving the security of the mobile network.
本申请实施例中的设备数据路径管控装置可以是电子设备,例如具有操作系统的电子设备,也可以是电子设备中的部件,例如集成电路或芯片。该电子设备可以是终端,也可以为除终端之外的其他设备。示例性的,终端可以包括但不限于上述所列举的终端11的类型,其他设备可以为服务器、网络附属存储器(Network Attached Storage,NAS)等,本申请实施例不作具体限定。The device data path management and control device in the embodiment of the present application may be an electronic device, such as an electronic device with an operating system, or may be a component in the electronic device, such as an integrated circuit or chip. The electronic device may be a terminal or other devices other than the terminal. For example, terminals may include but are not limited to the types of terminals 11 listed above, and other devices may be servers, network attached storage (Network Attached Storage, NAS), etc., which are not specifically limited in the embodiment of this application.
本申请实施例提供的设备数据路径管控装置能够实现图6的方法实施例实现的各个过程,并达到相同的技术效果,为避免重复,这里不再赘述。The device data path management and control device provided by the embodiment of the present application can implement each process implemented by the method embodiment in Figure 6 and achieve the same technical effect. To avoid duplication, the details will not be described here.
如图8所示,本申请实施例提供一种设备数据路径管控方法,该方法的执行主体为第二网络功能,换言之,该方法可以由安装在第二网络功能的软件或硬件来执行。所述方法包括以下步骤。As shown in Figure 8, this embodiment of the present application provides a device data path management and control method. The method is executed by the second network function. In other words, the method can be executed by software or hardware installed in the second network function. The method includes the following steps.
S810、第二网络功能向第一网络功能发送第一信息,所述第一信息包括规则信息和规则事件信息。S810. The second network function sends first information to the first network function, where the first information includes rule information and rule event information.
可选的,所述规则事件信息包括以下至少一项:Optionally, the rule event information includes at least one of the following:
持续时间信息、有效时间信息、无效时间信息、违规访问指示、违规访问次数。Duration information, valid time information, invalid time information, illegal access instructions, and number of illegal accesses.
可选的,所述规则信息包括以下至少一项:Optionally, the rule information includes at least one of the following:
中继规则信息、转发规则信息;Relay rule information and forwarding rule information;
其中,所述中继规则信息指示第一设备转发移动网络与第三设备间的数据的规则,所述转发规则信息用于指示第三网络功能转发移动网络与数据网络间的数据的规则,所述第三设备为通过所述第一设备接收来自移动网络侧的数据或向移动网络侧发送数据的设备。Wherein, the relay rule information indicates the rules for the first device to forward data between the mobile network and the third device, and the forwarding rule information is used to indicate the rules for the third network function to forward data between the mobile network and the data network, so The third device is a device that receives data from the mobile network side or sends data to the mobile network side through the first device.
可选的,所述中继规则信息和所述转发规则信息包括以下至少一项:Optionally, the relay rule information and the forwarding rule information include at least one of the following:
上行数据过滤规则;Upstream data filtering rules;
下行数据过滤规则;Downstream data filtering rules;
上行数据转发规则;Upstream data forwarding rules;
下行数据转发规则。Downstream data forwarding rules.
可选的,所述规则事件信息从第一设备或第二设备接收。Optionally, the rule event information is received from the first device or the second device.
步骤S810可以实现如图3-图4所示的方法实施例,并得到相同的技术效果,重复部分此处不再赘述。Step S810 can implement the method embodiment shown in Figures 3-4 and obtain the same technical effect, and the repeated parts will not be described again here.
由上述实施例的技术方案可知,本申请实施例通过向第一网络功能发送第一信息,所述第一信息包括规则信息和规则事件信息,从而可以根据规则事件信息对第三设备与移动网络的数据路径进行有效管控,提高移动网络的 安全性。It can be seen from the technical solutions of the above embodiments that the embodiments of the present application send the first information to the first network function, where the first information includes rule information and rule event information, so that the third device and the mobile network can be configured according to the rule event information. Effectively manage and control data paths to improve the efficiency of mobile networks safety.
本申请实施例提供的设备数据路径管控方法,执行主体可以为设备数据路径管控装置。本申请实施例中以设备数据路径管控装置执行设备数据路径管控方法为例,说明本申请实施例提供的设备数据路径管控装置。For the device data path management and control method provided by the embodiments of the present application, the execution subject may be a device data path management and control device. In the embodiments of this application, the device data path management and control device performing the device data path management and control method is used as an example to illustrate the device data path management and control device provided by the embodiments of this application.
如图9所示,所述设备数据路径管控装置包括:第三传输模块901和第三执行模块902。As shown in Figure 9, the device data path management and control device includes: a third transmission module 901 and a third execution module 902.
所述第三执行模块902用于获取第一信息;所述第三传输模块901用于向第一网络功能发送第一信息,所述第一信息包括规则信息和规则事件信息。The third execution module 902 is used to obtain the first information; the third transmission module 901 is used to send the first information to the first network function, where the first information includes rule information and rule event information.
可选的,所述规则事件信息包括以下至少一项:Optionally, the rule event information includes at least one of the following:
持续时间信息、有效时间信息、无效时间信息、违规访问指示、违规访问次数。Duration information, valid time information, invalid time information, illegal access instructions, and number of illegal accesses.
可选的,所述规则信息包括以下至少一项:Optionally, the rule information includes at least one of the following:
中继规则信息、转发规则信息;Relay rule information and forwarding rule information;
其中,所述中继规则信息指示第一设备转发移动网络与第三设备间的数据的规则,所述转发规则信息用于指示第三网络功能转发移动网络与数据网络间的数据的规则,所述第三设备为通过所述第一设备接收来自移动网络侧的数据或向移动网络侧发送数据的设备。Wherein, the relay rule information indicates the rules for the first device to forward data between the mobile network and the third device, and the forwarding rule information is used to indicate the rules for the third network function to forward data between the mobile network and the data network, so The third device is a device that receives data from the mobile network side or sends data to the mobile network side through the first device.
可选的,所述中继规则信息和所述转发规则信息包括以下至少一项:Optionally, the relay rule information and the forwarding rule information include at least one of the following:
上行数据过滤规则;Upstream data filtering rules;
下行数据过滤规则;Downstream data filtering rules;
上行数据转发规则;Upstream data forwarding rules;
下行数据转发规则。Downstream data forwarding rules.
可选的,所述规则事件信息从第一设备或第二设备接收。Optionally, the rule event information is received from the first device or the second device.
由上述实施例的技术方案可知,本申请实施例通过向第一网络功能发送第一信息,所述第一信息包括规则信息和规则事件信息,从而可以根据规则事件信息对第三设备与移动网络的数据路径进行有效管控,提高移动网络的安全性。It can be seen from the technical solutions of the above embodiments that the embodiments of the present application send the first information to the first network function, where the first information includes rule information and rule event information, so that the third device and the mobile network can be configured according to the rule event information. Effectively manage and control data paths to improve the security of mobile networks.
本申请实施例中的设备数据路径管控装置可以是电子设备,例如具有操作系统的电子设备,也可以是电子设备中的部件,例如集成电路或芯片。该电子设备可以是终端,也可以为除终端之外的其他设备。示例性的,终端可以包括但不限于上述所列举的终端11的类型,其他设备可以为服务器、网络附属存储器(Network Attached Storage,NAS)等,本申请实施例不作具体限定。The device data path management and control device in the embodiment of the present application may be an electronic device, such as an electronic device with an operating system, or may be a component in the electronic device, such as an integrated circuit or chip. The electronic device may be a terminal or other devices other than the terminal. For example, terminals may include but are not limited to the types of terminals 11 listed above, and other devices may be servers, network attached storage (Network Attached Storage, NAS), etc., which are not specifically limited in the embodiment of this application.
本申请实施例提供的设备数据路径管控装置能够实现图8的方法实施例实现的各个过程,并达到相同的技术效果,为避免重复,这里不再赘述。 The device data path management and control device provided by the embodiment of the present application can implement each process implemented by the method embodiment in Figure 8 and achieve the same technical effect. To avoid duplication, the details will not be described here.
如图10所示,本申请实施例提供一种设备数据路径管控方法,该方法的执行主体为第三设备,换言之,该方法可以由安装在第三设备的软件或硬件来执行。所述方法包括以下步骤。As shown in Figure 10, an embodiment of the present application provides a device data path management and control method. The execution subject of the method is a third device. In other words, the method can be executed by software or hardware installed on the third device. The method includes the following steps.
S1010、第三设备向第一设备或第二设备发送第三信息,所述第三信息包括数据转发的规则事件信息;S1010. The third device sends third information to the first device or the second device, where the third information includes rule event information for data forwarding;
其中,所述规则事件信息用于指示确定所述数据转发有效或失效的相关信息;所述第三设备为通过所述第一设备接收来自移动网络侧的数据或向移动网络侧发送数据的设备。Wherein, the rule event information is used to indicate relevant information for determining whether the data forwarding is valid or invalid; the third device is a device that receives data from the mobile network side through the first device or sends data to the mobile network side. .
可选的,所述规则事件信息包括以下至少一项:Optionally, the rule event information includes at least one of the following:
持续时间信息、有效时间信息、无效时间信息、违规访问指示、违规访问次数。Duration information, valid time information, invalid time information, illegal access instructions, and number of illegal accesses.
可选的,所述违规访问指示用于指示在检测到与规则信息不匹配的数据的情况下,指示所述第一设备终止转发移动网络与所述第三设备间的数据。Optionally, the violation access indication is used to instruct the first device to terminate forwarding data between the mobile network and the third device when data that does not match the rule information is detected.
可选的,所述违规访问次数用于指示在检测到与规则信息不匹配的数据超过所述违规访问次数的情况下,指示所述第一设备终止转发移动网络与所述第三设备间的数据。Optionally, the number of illegal accesses is used to indicate that when data that does not match the rule information is detected to exceed the number of illegal accesses, instruct the first device to terminate forwarding between the mobile network and the third device. data.
步骤S1010可以实现如图3-图4所示的方法实施例,并得到相同的技术效果,重复部分此处不再赘述。Step S1010 can implement the method embodiment shown in Figures 3-4 and obtain the same technical effect, and the repeated parts will not be described again here.
由上述实施例的技术方案可知,本申请实施例通过向第一设备或第二设备发送第三信息,所述第三信息包括数据转发的规则事件信息;其中,所述规则事件信息用于指示确定所述数据转发有效或失效的相关信息,从而可以根据规则事件信息对第三设备与移动网络的数据路径进行有效管控,提高移动网络的安全性。It can be known from the technical solutions of the above embodiments that the embodiments of the present application send third information to the first device or the second device. The third information includes rule event information for data forwarding; wherein the rule event information is used to indicate Relevant information that determines whether the data forwarding is valid or invalid can effectively control the data path between the third device and the mobile network based on the rule event information, thereby improving the security of the mobile network.
本申请实施例提供的设备数据路径管控方法,执行主体可以为设备数据路径管控装置。本申请实施例中以设备数据路径管控装置执行设备数据路径管控方法为例,说明本申请实施例提供的设备数据路径管控装置。For the device data path management and control method provided by the embodiments of the present application, the execution subject may be a device data path management and control device. In the embodiments of this application, the device data path management and control device performing the device data path management and control method is used as an example to illustrate the device data path management and control device provided by the embodiments of this application.
如图11所示,所述设备数据路径管控装置包括:第四传输模块1101和第四执行模块1102。As shown in Figure 11, the device data path management and control device includes: a fourth transmission module 1101 and a fourth execution module 1102.
所述第四执行模块1102用于获取第三信息;所述第四传输模块1101用于向第一设备或第二设备发送所述第三信息,所述第三信息包括数据转发的规则事件信息;其中,所述规则事件信息用于指示确定所述数据转发有效或失效的相关信息;所述设备接入管控装置为通过所述第一设备接收来自移动网络侧的数据或向移动网络侧发送数据的设备。The fourth execution module 1102 is used to obtain third information; the fourth transmission module 1101 is used to send the third information to the first device or the second device, where the third information includes rule event information for data forwarding. ; Wherein, the rule event information is used to indicate relevant information for determining whether the data forwarding is valid or invalid; the device access management and control device is to receive data from the mobile network side through the first device or send data to the mobile network side. data device.
可选的,所述规则事件信息包括以下至少一项:Optionally, the rule event information includes at least one of the following:
持续时间信息、有效时间信息、无效时间信息、违规访问指示、违规访 问次数。Duration information, valid time information, invalid time information, illegal access instructions, illegal access Ask the number of times.
可选的,所述违规访问指示用于指示在检测到与规则信息不匹配的数据的情况下,指示所述第一设备终止转发移动网络与所述第三设备间的数据。Optionally, the violation access indication is used to instruct the first device to terminate forwarding data between the mobile network and the third device when data that does not match the rule information is detected.
可选的,所述违规访问次数用于指示在检测到与规则信息不匹配的数据超过所述违规访问次数的情况下,指示所述第一设备终止转发移动网络与所述第三设备间的数据。Optionally, the number of illegal accesses is used to indicate that when data that does not match the rule information is detected to exceed the number of illegal accesses, instruct the first device to terminate forwarding between the mobile network and the third device. data.
由上述实施例的技术方案可知,本申请实施例通过向第一设备或第二设备发送第三信息,所述第三信息包括数据转发的规则事件信息;其中,所述规则事件信息用于指示确定所述数据转发有效或失效的相关信息,从而可以根据规则事件信息对第三设备与移动网络的数据路径进行有效管控,提高移动网络的安全性。It can be known from the technical solutions of the above embodiments that the embodiments of the present application send third information to the first device or the second device. The third information includes rule event information for data forwarding; wherein the rule event information is used to indicate Relevant information that determines whether the data forwarding is valid or invalid can effectively control the data path between the third device and the mobile network based on the rule event information, thereby improving the security of the mobile network.
本申请实施例中的设备数据路径管控装置可以是电子设备,例如具有操作系统的电子设备,也可以是电子设备中的部件,例如集成电路或芯片。该电子设备可以是终端,也可以为除终端之外的其他设备。示例性的,终端可以包括但不限于上述所列举的终端11的类型,其他设备可以为服务器、网络附属存储器(Network Attached Storage,NAS)等,本申请实施例不作具体限定。The device data path management and control device in the embodiment of the present application may be an electronic device, such as an electronic device with an operating system, or may be a component in the electronic device, such as an integrated circuit or chip. The electronic device may be a terminal or other devices other than the terminal. For example, terminals may include but are not limited to the types of terminals 11 listed above, and other devices may be servers, network attached storage (Network Attached Storage, NAS), etc., which are not specifically limited in the embodiment of this application.
本申请实施例提供的设备数据路径管控装置能够实现图10的方法实施例实现的各个过程,并达到相同的技术效果,为避免重复,这里不再赘述。The device data path management and control device provided by the embodiment of the present application can implement each process implemented by the method embodiment in Figure 10 and achieve the same technical effect. To avoid duplication, the details will not be described here.
如图12所示,本申请实施例提供一种设备数据路径管控方法,该方法的执行主体为第二设备,换言之,该方法可以由安装在第二设备的软件或硬件来执行。所述方法还包括以下步骤。As shown in Figure 12, this embodiment of the present application provides a device data path management and control method. The execution subject of the method is the second device. In other words, the method can be executed by software or hardware installed on the second device. The method also includes the following steps.
S1210、第二设备向第二网络功能发送第四信息,所述第四信息包括数据转发的规则事件信息;所述规则事件信息用于指示确定所述数据转发有效或失效的相关信息。S1210. The second device sends fourth information to the second network function, where the fourth information includes rule event information for data forwarding; the rule event information is used to indicate relevant information for determining whether the data forwarding is valid or invalid.
可选的,所述规则事件信息包括以下至少一项:Optionally, the rule event information includes at least one of the following:
持续时间信息、有效时间信息、无效时间信息、违规访问指示、违规访问次数。Duration information, valid time information, invalid time information, illegal access instructions, and number of illegal accesses.
可选的,所述规则事件信息从第三设备或第一设备接收;Optionally, the rule event information is received from the third device or the first device;
其中,所述第三设备为通过所述第一设备接收来自移动网络侧的数据或向移动网络侧发送数据的设备。Wherein, the third device is a device that receives data from the mobile network side or sends data to the mobile network side through the first device.
可选的,所述违规访问指示用于指示在检测到与规则信息不匹配的数据的情况下,指示第一设备终止转发移动网络与第三设备间的数据。Optionally, the illegal access indication is used to instruct the first device to terminate forwarding data between the mobile network and the third device when data that does not match the rule information is detected.
可选的,所述违规访问次数用于指示在检测到与规则信息不匹配的数据超过所述违规访问次数的情况下,指示第一设备终止转发移动网络与第三设 备间的数据。Optionally, the number of illegal accesses is used to indicate that when data that does not match the rule information is detected to exceed the number of illegal accesses, instruct the first device to terminate forwarding between the mobile network and the third device. backup data.
步骤S1210可以实现如图3-图4所示的方法实施例,并得到相同的技术效果,重复部分此处不再赘述。Step S1210 can implement the method embodiment shown in Figures 3-4 and obtain the same technical effect, and the repeated parts will not be described again here.
由上述实施例的技术方案可知,本申请实施例通过向第二网络功能发送第四信息,所述第四信息包括数据转发的规则事件信息;所述规则事件信息用于指示确定所述数据转发有效或失效的相关信息,从而可以根据规则事件信息对第三设备与移动网络的数据路径进行有效管控,提高移动网络的安全性。It can be seen from the technical solutions of the above embodiments that the embodiments of the present application send fourth information to the second network function. The fourth information includes rule event information for data forwarding; the rule event information is used to indicate the determination of the data forwarding. Valid or invalid relevant information, so that the data path between the third device and the mobile network can be effectively controlled based on the rule event information, and the security of the mobile network can be improved.
本申请实施例提供的设备数据路径管控方法,执行主体可以为设备数据路径管控装置。本申请实施例中以设备数据路径管控装置执行设备数据路径管控方法为例,说明本申请实施例提供的设备数据路径管控装置。For the device data path management and control method provided by the embodiments of the present application, the execution subject may be a device data path management and control device. In the embodiments of this application, the device data path management and control device performing the device data path management and control method is used as an example to illustrate the device data path management and control device provided by the embodiments of this application.
如图13所示,所述设备数据路径管控装置包括:第五传输模块1301和第五执行模块1302。As shown in Figure 13, the device data path management and control device includes: a fifth transmission module 1301 and a fifth execution module 1302.
所述第五执行模块1302用于获取第四信息;所述第五传输模块1301用于向第二网络功能发送第四信息,所述第四信息包括数据转发的规则事件信息;所述规则事件信息用于指示确定所述数据转发有效或失效的相关信息。The fifth execution module 1302 is used to obtain fourth information; the fifth transmission module 1301 is used to send fourth information to the second network function, where the fourth information includes rule event information for data forwarding; the rule event The information is used to indicate relevant information that determines whether the data forwarding is valid or invalid.
可选的,所述规则事件信息包括以下至少一项:Optionally, the rule event information includes at least one of the following:
持续时间信息、有效时间信息、无效时间信息、违规访问指示、违规访问次数。Duration information, valid time information, invalid time information, illegal access instructions, and number of illegal accesses.
可选的,所述规则事件信息从第三设备或第一设备接收;Optionally, the rule event information is received from the third device or the first device;
其中,所述第三设备为通过所述第一设备接收来自移动网络侧的数据或向移动网络侧发送数据的设备。Wherein, the third device is a device that receives data from the mobile network side or sends data to the mobile network side through the first device.
可选的,所述违规访问指示用于指示在检测到与规则信息不匹配的数据的情况下,指示第一设备终止转发移动网络与第三设备间的数据。Optionally, the illegal access indication is used to instruct the first device to terminate forwarding data between the mobile network and the third device when data that does not match the rule information is detected.
可选的,所述违规访问次数用于指示在检测到与规则信息不匹配的数据超过所述违规访问次数的情况下,指示第一设备终止转发移动网络与第三设备间的数据。Optionally, the number of illegal accesses is used to instruct the first device to terminate forwarding data between the mobile network and the third device when detecting data that does not match the rule information exceeds the number of illegal accesses.
由上述实施例的技术方案可知,本申请实施例通过向第二网络功能发送第四信息,所述第四信息包括数据转发的规则事件信息;所述规则事件信息用于指示确定所述数据转发有效或失效的相关信息,从而可以根据规则事件信息对第三设备与移动网络的数据路径进行有效管控,提高移动网络的安全性。It can be seen from the technical solutions of the above embodiments that the embodiments of the present application send fourth information to the second network function. The fourth information includes rule event information for data forwarding; the rule event information is used to indicate the determination of the data forwarding. Valid or invalid relevant information, so that the data path between the third device and the mobile network can be effectively controlled based on the rule event information, and the security of the mobile network can be improved.
本申请实施例中的设备数据路径管控装置可以是电子设备,例如具有操作系统的电子设备,也可以是电子设备中的部件,例如集成电路或芯片。该电子设备可以是终端,也可以为除终端之外的其他设备。示例性的,终端可 以包括但不限于上述所列举的终端11的类型,其他设备可以为服务器、网络附属存储器(Network Attached Storage,NAS)等,本申请实施例不作具体限定。The device data path management and control device in the embodiment of the present application may be an electronic device, such as an electronic device with an operating system, or may be a component in the electronic device, such as an integrated circuit or chip. The electronic device may be a terminal or other devices other than the terminal. For example, the terminal can The types of terminals 11 include but are not limited to those listed above. Other devices may be servers, network attached storage (Network Attached Storage, NAS), etc., which are not specifically limited in the embodiments of this application.
本申请实施例提供的设备数据路径管控装置能够实现图12的方法实施例实现的各个过程,并达到相同的技术效果,为避免重复,这里不再赘述。The device data path management and control device provided by the embodiment of the present application can implement each process implemented by the method embodiment in Figure 12 and achieve the same technical effect. To avoid duplication, the details will not be described here.
可选的,如图14所示,本申请实施例还提供一种通信设备1400,包括处理器1401和存储器1402,存储器1402上存储有可在所述处理器1401上运行的程序或指令,例如,该通信设备1400为终端时,该程序或指令被处理器1401执行时实现上述设备数据路径管控方法实施例的各个步骤,且能达到相同的技术效果。该通信设备1400为网络侧设备时,该程序或指令被处理器1401执行时实现上述设备数据路径管控方法实施例的各个步骤,且能达到相同的技术效果,为避免重复,这里不再赘述。Optionally, as shown in Figure 14, this embodiment of the present application also provides a communication device 1400, which includes a processor 1401 and a memory 1402. The memory 1402 stores programs or instructions that can be run on the processor 1401, such as , when the communication device 1400 is a terminal, when the program or instruction is executed by the processor 1401, each step of the above device data path management and control method embodiment is implemented, and the same technical effect can be achieved. When the communication device 1400 is a network-side device, when the program or instruction is executed by the processor 1401, each step of the above device data path management and control method embodiment is implemented, and the same technical effect can be achieved. To avoid duplication, the details are not repeated here.
本申请实施例还提供一种终端,包括处理器和通信接口,处理器用于根据所述第二信息执行以下至少一项:基于所述中继规则信息转发所述移动网络与第三设备间的数据;基于所述中继规则事件信息,有效或无效所述中继规则信息;基于所述终止中继指示,终止转发移动网络与第三设备间的数据,通信接口用于从移动网络侧接收第二信息,所述第二信息包括以下至少一项:中继规则信息和中继规则事件信息;终止中继指示。该终端实施例与上述终端侧方法实施例对应,上述方法实施例的各个实施过程和实现方式均可适用于该终端实施例中,且能达到相同的技术效果。具体地,图15为实现本申请实施例的一种终端的硬件结构示意图。An embodiment of the present application also provides a terminal, including a processor and a communication interface. The processor is configured to perform at least one of the following according to the second information: forwarding the communication between the mobile network and a third device based on the relay rule information. data; based on the relay rule event information, the relay rule information is valid or invalid; based on the termination relay indication, terminates the forwarding of data between the mobile network and the third device, and the communication interface is used to receive from the mobile network side Second information, the second information includes at least one of the following: relay rule information and relay rule event information; and an instruction to terminate relay. This terminal embodiment corresponds to the above-mentioned terminal-side method embodiment. Each implementation process and implementation manner of the above-mentioned method embodiment can be applied to this terminal embodiment, and can achieve the same technical effect. Specifically, FIG. 15 is a schematic diagram of the hardware structure of a terminal that implements an embodiment of the present application.
该终端1500包括但不限于:射频单元1501、网络模块1502、音频输出单元1503、输入单元1504、传感器1505、显示单元1506、用户输入单元1507、接口单元1508、存储器1509以及处理器1510等中的至少部分部件。The terminal 1500 includes but is not limited to: a radio frequency unit 1501, a network module 1502, an audio output unit 1503, an input unit 1504, a sensor 1505, a display unit 1506, a user input unit 1507, an interface unit 1508, a memory 1509, a processor 1510, etc. At least some parts.
本领域技术人员可以理解,终端1500还可以包括给各个部件供电的电源(比如电池),电源可以通过电源管理系统与处理器1510逻辑相连,从而通过电源管理系统实现管理充电、放电、以及功耗管理等功能。图15中示出的终端结构并不构成对终端的限定,终端可以包括比图示更多或更少的部件,或者组合某些部件,或者不同的部件布置,在此不再赘述。Those skilled in the art can understand that the terminal 1500 may also include a power supply (such as a battery) that supplies power to various components. The power supply may be logically connected to the processor 1510 through a power management system, thereby managing charging, discharging, and power consumption through the power management system. Management and other functions. The terminal structure shown in FIG. 15 does not constitute a limitation on the terminal. The terminal may include more or fewer components than shown in the figure, or some components may be combined or arranged differently, which will not be described again here.
应理解的是,本申请实施例中,输入单元1504可以包括图形处理单元(Graphics Processing Unit,GPU)15041和麦克风15042,GPU15041对在视频捕获模式或图像捕获模式中由图像捕获装置(如摄像头)获得的静态图片或视频的图像数据进行处理。显示单元1506可包括显示面板15061,可以采用液晶显示器、有机发光二极管等形式来配置显示面板15061。用户输入单元1507包括触控面板15071以及其他输入设备15072中的至少一种。触控面 板15071,也称为触摸屏。触控面板15071可包括触摸检测装置和触摸控制器两个部分。其他输入设备15072可以包括但不限于物理键盘、功能键(比如音量控制按键、开关按键等)、轨迹球、鼠标、操作杆,在此不再赘述。It should be understood that in the embodiment of the present application, the input unit 1504 may include a graphics processing unit (GPU) 15041 and a microphone 15042. The GPU 15041 is used for recording data by an image capture device (such as a camera) in the video capture mode or the image capture mode. The image data obtained from still pictures or videos is processed. The display unit 1506 may include a display panel 15061, which may be configured in the form of a liquid crystal display, an organic light emitting diode, or the like. The user input unit 1507 includes a touch panel 15071 and at least one of other input devices 15072 . touch surface Board 15071, also known as touch screen. The touch panel 15071 may include two parts: a touch detection device and a touch controller. Other input devices 15072 may include but are not limited to physical keyboards, function keys (such as volume control keys, switch keys, etc.), trackballs, mice, and joysticks, which will not be described again here.
本申请实施例中,射频单元1501接收来自网络侧设备的下行数据后,可以传输给处理器1510进行处理;另外,射频单元1501可以向网络侧设备发送上行数据。通常,射频单元1501包括但不限于天线、放大器、收发信机、耦合器、低噪声放大器、双工器等。In this embodiment of the present application, after receiving downlink data from the network side device, the radio frequency unit 1501 can transmit it to the processor 1510 for processing; in addition, the radio frequency unit 1501 can send uplink data to the network side device. Generally, the radio frequency unit 1501 includes, but is not limited to, an antenna, amplifier, transceiver, coupler, low noise amplifier, duplexer, etc.
存储器1509可用于存储软件程序或指令以及各种数据。存储器1509可主要包括存储程序或指令的第一存储区和存储数据的第二存储区,其中,第一存储区可存储操作系统、至少一个功能所需的应用程序或指令(比如声音播放功能、图像播放功能等)等。此外,存储器1509可以包括易失性存储器或非易失性存储器,或者,存储器1509可以包括易失性和非易失性存储器两者。其中,非易失性存储器可以是只读存储器(Read-Only Memory,ROM)、可编程只读存储器(Programmable ROM,PROM)、可擦除可编程只读存储器(Erasable PROM,EPROM)、电可擦除可编程只读存储器(Electrically EPROM,EEPROM)或闪存。易失性存储器可以是随机存取存储器(Random Access Memory,RAM),静态随机存取存储器(Static RAM,SRAM)、动态随机存取存储器(Dynamic RAM,DRAM)、同步动态随机存取存储器(Synchronous DRAM,SDRAM)、双倍数据速率同步动态随机存取存储器(Double Data Rate SDRAM,DDRSDRAM)、增强型同步动态随机存取存储器(Enhanced SDRAM,ESDRAM)、同步连接动态随机存取存储器(Synch link DRAM,SLDRAM)和直接内存总线随机存取存储器(Direct Rambus RAM,DRRAM)。本申请实施例中的存储器1509包括但不限于这些和任意其它适合类型的存储器。Memory 1509 may be used to store software programs or instructions as well as various data. The memory 1509 may mainly include a first storage area for storing programs or instructions and a second storage area for storing data, wherein the first storage area may store an operating system, an application program or instructions required for at least one function (such as a sound playback function, Image playback function, etc.) etc. Additionally, memory 1509 may include volatile memory or nonvolatile memory, or memory 1509 may include both volatile and nonvolatile memory. Among them, non-volatile memory can be read-only memory (Read-Only Memory, ROM), programmable read-only memory (Programmable ROM, PROM), erasable programmable read-only memory (Erasable PROM, EPROM), electrically removable memory. Erase programmable read-only memory (Electrically EPROM, EEPROM) or flash memory. Volatile memory can be random access memory (Random Access Memory, RAM), static random access memory (Static RAM, SRAM), dynamic random access memory (Dynamic RAM, DRAM), synchronous dynamic random access memory (Synchronous DRAM, SDRAM), double data rate synchronous dynamic random access memory (Double Data Rate SDRAM, DDRSDRAM), enhanced synchronous dynamic random access memory (Enhanced SDRAM, ESDRAM), synchronous link dynamic random access memory (Synch link DRAM) , SLDRAM) and direct memory bus random access memory (Direct Rambus RAM, DRRAM). Memory 1509 in embodiments of the present application includes, but is not limited to, these and any other suitable types of memory.
处理器1510可包括一个或多个处理单元;可选的,处理器1510集成应用处理器和调制解调处理器,其中,应用处理器主要处理涉及操作系统、用户界面和应用程序等的操作,调制解调处理器主要处理无线通信信号,如基带处理器。可以理解的是,上述调制解调处理器也可以不集成到处理器1510中。The processor 1510 may include one or more processing units; optionally, the processor 1510 integrates an application processor and a modem processor, where the application processor mainly handles operations related to the operating system, user interface, application programs, etc., Modem processors mainly process wireless communication signals, such as baseband processors. It can be understood that the above modem processor may not be integrated into the processor 1510.
其中,射频单元1501用于从移动网络侧接收第二信息,所述第二信息包括以下至少一项:中继规则信息和中继规则事件信息;终止中继指示。The radio frequency unit 1501 is configured to receive second information from the mobile network side, where the second information includes at least one of the following: relay rule information and relay rule event information; and a relay termination indication.
处理器1510,用于根据所述第二信息执行以下至少一项:Processor 1510, configured to perform at least one of the following according to the second information:
基于所述中继规则信息转发所述移动网络与第三设备间的数据;Forward data between the mobile network and the third device based on the relay rule information;
基于所述中继规则事件信息,有效或无效所述中继规则信息;Validate or invalidate the relay rule information based on the relay rule event information;
基于所述终止中继指示,终止转发移动网络与第三设备间的数据。Based on the termination relay indication, forwarding of data between the mobile network and the third device is terminated.
可选的,所述中继规则事件信息包括与所述中继规则信息对应的以下至 少一项:Optionally, the relay rule event information includes the following: One item missing:
持续时间信息;有效时间信息;无效时间信息。Duration information; valid time information; invalid time information.
可选的,在所述中继规则事件信息包括持续时间信息的情况下,所述处理器1510用于执行以下至少一项:Optionally, in the case where the relay rule event information includes duration information, the processor 1510 is configured to perform at least one of the following:
在基于所述持续时间信息确定的有效期有效的情况下,启用所述中继规则信息;If the validity period determined based on the duration information is valid, enable the relay rule information;
在基于所述持续时间信息确定的有效期失效的情况下,停用所述中继规则信息。In the event that the validity period determined based on the duration information expires, the relay rule information is deactivated.
可选的,在所述中继规则事件信息包括有效时间信息的情况下,所述处理器1510用于在当前时间到达所述有效时间信息确定的时间或时间范围的情况下,启用所述中继规则信息。Optionally, in the case where the relay rule event information includes valid time information, the processor 1510 is configured to enable the medium when the current time reaches the time or time range determined by the valid time information. Following rule information.
可选的,在所述中继规则事件信息包括中继无效时间信息的情况下,处理器1510用于在当前时间到达所述中继无效时间信息确定的时间或时间范围的情况下,停用所述中继规则信息。Optionally, when the relay rule event information includes relay invalid time information, the processor 1510 is configured to deactivate the relay when the current time reaches the time or time range determined by the relay invalid time information. The relay rule information.
可选的,所述中继规则信息包括以下至少一项:Optionally, the relay rule information includes at least one of the following:
上行数据过滤规则;Upstream data filtering rules;
下行数据过滤规则;Downstream data filtering rules;
上行数据转发规则;Upstream data forwarding rules;
下行数据转发规则。Downstream data forwarding rules.
可选的,在第一设备从移动网络侧接收第二信息之前,射频单元1501还用于向第二设备或第二网络功能发送第四信息,所述第四信息包括数据转发的规则事件信息。Optionally, before the first device receives the second information from the mobile network side, the radio frequency unit 1501 is also configured to send fourth information to the second device or the second network function, where the fourth information includes rule event information for data forwarding. .
可选的,所述规则事件信息从所述第三设备接收。Optionally, the rule event information is received from the third device.
可选的,所述规则事件信息包括以下至少一项:Optionally, the rule event information includes at least one of the following:
持续时间信息、有效时间信息、无效时间信息、违规访问指示、违规访问次数。Duration information, valid time information, invalid time information, illegal access instructions, and number of illegal accesses.
可选的,所述违规访问指示用于指示在检测到与规则信息不匹配的数据的情况下,终止转发移动网络与第三设备间的数据。Optionally, the illegal access indication is used to instruct to terminate the forwarding of data between the mobile network and the third device when data that does not match the rule information is detected.
可选的,所述违规访问次数用于指示在检测到与规则信息不匹配的数据超过所述违规访问次数的情况下,终止转发移动网络与第三设备间的数据。Optionally, the number of illegal accesses is used to indicate that when data that does not match the rule information is detected to exceed the number of illegal accesses, the forwarding of data between the mobile network and the third device is terminated.
本申请实施例可以根据规则事件信息对第三设备与移动网络的数据路径进行有效管控,提高移动网络的安全性。The embodiments of this application can effectively control the data path between the third device and the mobile network based on rule event information, thereby improving the security of the mobile network.
具体地,本申请实施例还提供了一种网络侧设备。如图16所示,该网络侧设备1600包括:处理器1601、网络接口1602和存储器1603。其中,网络接口1602例如为通用公共无线接口(common public radio interface,CPRI)。 Specifically, the embodiment of the present application also provides a network side device. As shown in Figure 16, the network side device 1600 includes: a processor 1601, a network interface 1602, and a memory 1603. The network interface 1602 is, for example, a common public radio interface (CPRI).
具体地,本发明实施例的网络侧设备1600还包括:存储在存储器1603上并可在处理器1601上运行的指令或程序,处理器1601调用存储器1603中的指令或程序执行图5或图9所示各模块执行的方法,并达到相同的技术效果,为避免重复,故不在此赘述。Specifically, the network side device 1600 in this embodiment of the present invention also includes: instructions or programs stored in the memory 1603 and executable on the processor 1601. The processor 1601 calls the instructions or programs in the memory 1603 to execute Figure 5 or Figure 9 The execution methods of each module are shown and achieve the same technical effect. To avoid repetition, they will not be described in detail here.
本申请实施例还提供一种可读存储介质,所述可读存储介质上存储有程序或指令,该程序或指令被处理器执行时实现上述设备数据路径管控方法实施例的各个过程,且能达到相同的技术效果,为避免重复,这里不再赘述。Embodiments of the present application also provide a readable storage medium. Programs or instructions are stored on the readable storage medium. When the program or instructions are executed by a processor, each process of the above device data path management and control method embodiment is implemented, and can To achieve the same technical effect, to avoid repetition, we will not repeat them here.
其中,所述处理器为上述实施例中所述的终端中的处理器。所述可读存储介质,可以是非易失性的,也可以是非瞬态的,所述可读存储介质可以包括计算机可读存储介质,如计算机只读存储器ROM、随机存取存储器RAM、磁碟或者光盘等。Wherein, the processor is the processor in the terminal described in the above embodiment. The readable storage medium may be non-volatile or non-transient. The readable storage medium may include computer-readable storage media, such as computer read-only memory ROM, random access memory RAM, and magnetic disks. Or CD, etc.
本申请实施例另提供了一种芯片,所述芯片包括处理器和通信接口,所述通信接口和所述处理器耦合,所述处理器用于运行程序或指令,实现上述设备数据路径管控方法实施例的各个过程,且能达到相同的技术效果,为避免重复,这里不再赘述。An embodiment of the present application further provides a chip. The chip includes a processor and a communication interface. The communication interface is coupled to the processor. The processor is used to run programs or instructions to implement the above device data path management and control method. Each process in the example can achieve the same technical effect. To avoid repetition, we will not repeat it here.
应理解,本申请实施例提到的芯片还可以称为系统级芯片,系统芯片,芯片系统或片上系统芯片等。It should be understood that the chips mentioned in the embodiments of this application may also be called system-on-chip, system-on-a-chip, system-on-chip or system-on-chip, etc.
本申请实施例另提供了一种计算机程序/程序产品,所述计算机程序/程序产品被存储在存储介质中,所述计算机程序/程序产品被至少一个处理器执行以实现上述设备数据路径管控方法实施例的各个过程,且能达到相同的技术效果,为避免重复,这里不再赘述。Embodiments of the present application further provide a computer program/program product. The computer program/program product is stored in a storage medium. The computer program/program product is executed by at least one processor to implement the above device data path management and control method. Each process of the embodiment can achieve the same technical effect, so to avoid repetition, it will not be described again here.
本申请实施例还提供了一种设备数据路径管控系统,包括:第一设备、第二设备、第三设备、第一网络功能和第二网络功能,所述第一设备、第二设备、第三设备、第一网络功能和第二网络功能可用于执行如上所述的设备数据路径管控方法的步骤。Embodiments of the present application also provide a device data path management and control system, including: a first device, a second device, a third device, a first network function and a second network function. The first device, the second device, the third device The three devices, the first network function and the second network function may be used to perform the steps of the device data path management and control method as described above.
需要说明的是,在本文中,术语“包括”、“包含”或者其任何其他变体意在涵盖非排他性的包含,从而使得包括一系列要素的过程、方法、物品或者装置不仅包括那些要素,而且还包括没有明确列出的其他要素,或者是还包括为这种过程、方法、物品或者装置所固有的要素。在没有更多限制的情况下,由语句“包括一个……”限定的要素,并不排除在包括该要素的过程、方法、物品或者装置中还存在另外的相同要素。此外,需要指出的是,本申请实施方式中的方法和装置的范围不限按示出或讨论的顺序来执行功能,还可包括根据所涉及的功能按基本同时的方式或按相反的顺序来执行功能,例如,可以按不同于所描述的次序来执行所描述的方法,并且还可以添加、省去、或组合各种步骤。另外,参照某些示例所描述的特征可在其他示例中 被组合。It should be noted that, in this document, the terms "comprising", "comprises" or any other variations thereof are intended to cover a non-exclusive inclusion, such that a process, method, article or device that includes a series of elements not only includes those elements, It also includes other elements not expressly listed or inherent in the process, method, article or apparatus. Without further limitation, an element defined by the statement "comprises a..." does not exclude the presence of additional identical elements in a process, method, article or apparatus that includes that element. In addition, it should be pointed out that the scope of the methods and devices in the embodiments of the present application is not limited to performing functions in the order shown or discussed, but may also include performing functions in a substantially simultaneous manner or in reverse order according to the functions involved. Functions may be performed, for example, the methods described may be performed in an order different from that described, and various steps may be added, omitted, or combined. Additionally, features described with reference to certain examples may be used in other examples Be combined.
通过以上的实施方式的描述,本领域的技术人员可以清楚地了解到上述实施例方法可借助软件加必需的通用硬件平台的方式来实现,当然也可以通过硬件,但很多情况下前者是更佳的实施方式。基于这样的理解,本申请的技术方案本质上或者说对相关技术做出贡献的部分可以以计算机软件产品的形式体现出来,该计算机软件产品存储在一个存储介质(如ROM/RAM、磁碟、光盘)中,包括若干指令用以使得一台终端(可以是手机,计算机,服务器,空调器,或者网络设备等)执行本申请各个实施例所述的方法。Through the above description of the embodiments, those skilled in the art can clearly understand that the methods of the above embodiments can be implemented by means of software plus the necessary general hardware platform. Of course, it can also be implemented by hardware, but in many cases the former is better. implementation. Based on this understanding, the technical solution of the present application can be embodied in the form of a computer software product that is essentially or contributes to related technologies. The computer software product is stored in a storage medium (such as ROM/RAM, disk, CD), including several instructions to cause a terminal (which can be a mobile phone, computer, server, air conditioner, or network device, etc.) to execute the methods described in various embodiments of this application.
上面结合附图对本申请的实施例进行了描述,但是本申请并不局限于上述的具体实施方式,上述的具体实施方式仅仅是示意性的,而不是限制性的,本领域的普通技术人员在本申请的启示下,在不脱离本申请宗旨和权利要求所保护的范围情况下,还可做出很多形式,均属于本申请的保护之内。 The embodiments of the present application have been described above in conjunction with the accompanying drawings. However, the present application is not limited to the above-mentioned specific implementations. The above-mentioned specific implementations are only illustrative and not restrictive. Those of ordinary skill in the art will Inspired by this application, many forms can be made without departing from the purpose of this application and the scope protected by the claims, all of which fall within the protection of this application.

Claims (43)

  1. 一种设备数据路径管控方法,包括:A device data path management and control method, including:
    第一网络功能从第二网络功能接收第一信息,所述第一信息包括规则信息和规则事件信息;The first network function receives first information from the second network function, the first information including rule information and rule event information;
    根据所述第一信息,所述第一网络功能执行以下至少一项:According to the first information, the first network function performs at least one of the following:
    基于所述规则信息,向第一设备发送中继规则信息;Based on the rule information, send relay rule information to the first device;
    基于所述规则事件信息,向第一设备发送中继规则事件信息;Based on the rule event information, send relay rule event information to the first device;
    基于所述规则信息,向第三网络功能配置转发规则信息;Based on the rule information, forward the rule information to a third network function configuration;
    基于所述规则事件信息,有效或无效所述转发规则信息的配置;Validate or invalidate the configuration of the forwarding rule information based on the rule event information;
    其中,所述中继规则信息用于指示所述第一设备转发移动网络与第三设备间的数据的规则,所述转发规则信息用于指示所述第三网络功能转发移动网络与数据网络间的数据的规则,所述规则事件信息用于指示所述规则信息的有效或无效条件,所述中继规则事件信息用于指示所述中继规则信息的有效或无效条件,所述第三设备为通过所述第一设备接收来自移动网络侧的数据或向移动网络侧发送数据的设备。Wherein, the relay rule information is used to instruct the first device to forward the rules of data between the mobile network and the third device, and the forwarding rule information is used to instruct the third network function to forward the data between the mobile network and the data network. rules for data, the rule event information is used to indicate the valid or invalid condition of the rule information, the relay rule event information is used to indicate the valid or invalid condition of the relay rule information, the third device It is a device that receives data from the mobile network side or sends data to the mobile network side through the first device.
  2. 根据权利要求1所述的方法,其中,所述规则事件信息包括与所述转发规则信息对应的以下至少一项:The method according to claim 1, wherein the rule event information includes at least one of the following corresponding to the forwarding rule information:
    持续时间信息、有效时间信息、无效时间信息、违规访问指示、违规访问次数。Duration information, valid time information, invalid time information, illegal access instructions, and number of illegal accesses.
  3. 根据权利要求1所述的方法,其中,所述中继规则事件信息包括与所述中继规则信息对应的以下至少一项:The method according to claim 1, wherein the relay rule event information includes at least one of the following corresponding to the relay rule information:
    持续时间信息、有效时间信息、无效时间信息。Duration information, valid time information, invalid time information.
  4. 根据权利要求2所述的方法,其中,在所述规则事件信息包括持续时间信息的情况下,所述基于所述规则事件信息,有效或无效所述转发规则信息的配置,包括以下至少一项:The method of claim 2, wherein, in the case where the rule event information includes duration information, the configuration of valid or invalid forwarding rule information based on the rule event information includes at least one of the following :
    在基于所述持续时间信息确定的有效期有效的情况下,所述第一网络功能向所述第三网络功能指示所述转发规则信息有效;If the validity period determined based on the duration information is valid, the first network function indicates to the third network function that the forwarding rule information is valid;
    在基于所述持续时间信息确定的有效期失效的情况下,所述第一网络功能向所述第三网络功能指示所述转发规则信息失效。In the event that the validity period determined based on the duration information expires, the first network function indicates to the third network function that the forwarding rule information expires.
  5. 根据权利要求2所述的方法,其中,在所述规则事件信息包括有效时间信息的情况下,所述基于所述规则事件信息,有效或无效所述转发规则信息的配置,包括:The method according to claim 2, wherein, in the case where the rule event information includes valid time information, the configuration of valid or invalid forwarding rule information based on the rule event information includes:
    在当前时间到达所述有效时间信息确定的时间或时间范围的情况下,所述第一网络功能向所述第三网络功能指示所述转发规则信息有效。When the current time reaches the time or time range determined by the valid time information, the first network function indicates to the third network function that the forwarding rule information is valid.
  6. 根据权利要求2所述的方法,其中,在所述规则事件信息包括无效时 间信息的情况下,所述基于所述规则事件信息,有效或无效所述转发规则信息的配置,包括:The method of claim 2, wherein when the rule event information includes invalid In the case of intermittent information, the configuration of valid or invalid forwarding rule information based on the rule event information includes:
    在当前时间到达所述无效时间信息确定的时间或时间范围的情况下,所述第一网络功能向所述第三网络功能指示所述转发规则信息无效。When the current time reaches the time or time range determined by the invalid time information, the first network function indicates to the third network function that the forwarding rule information is invalid.
  7. 根据权利要求2所述的方法,其中,在所述规则事件信息包括违规访问指示的情况下,所述基于所述规则事件信息,有效或无效所述转发规则信息的配置,包括:The method according to claim 2, wherein, in the case where the rule event information includes a violation access indication, the configuration of valid or invalid forwarding rule information based on the rule event information includes:
    在检测到与所述规则信息不匹配的数据的情况下,所述第一网络功能向所述第三网络功能指示所述转发规则信息无效。In the event that data that does not match the rule information is detected, the first network function indicates to the third network function that the forwarding rule information is invalid.
  8. 根据权利要求2所述的方法,其中,在所述规则事件信息包括违规访问次数的情况下,所述基于所述规则事件信息,有效或无效所述转发规则信息的配置,包括:The method according to claim 2, wherein, in the case where the rule event information includes the number of access violations, the configuration of valid or invalid forwarding rule information based on the rule event information includes:
    在检测到与所述规则信息不匹配的数据超过所述违规访问次数的情况下,所述第一网络功能向所述第三网络功能指示所述转发规则信息无效。When it is detected that data that does not match the rule information exceeds the number of illegal accesses, the first network function indicates to the third network function that the forwarding rule information is invalid.
  9. 根据权利要求2、7或8所述的方法,其中,在所述规则事件信息包括违规访问指示和/或违规访问次数的情况下,所述方法还包括:The method according to claim 2, 7 or 8, wherein, in the case where the rule event information includes a violation access indication and/or a violation access number, the method further includes:
    所述第一网络功能向第一设备发送终止中继指示,所述终止中继指示用于指示所述第一设备终止转发移动网络与所述第三设备间的数据。The first network function sends a termination relay indication to the first device, where the termination relay indication is used to instruct the first device to terminate forwarding data between the mobile network and the third device.
  10. 根据权利要求1所述的方法,其中,所述中继规则信息和所述转发规则信息包括以下至少一项:The method according to claim 1, wherein the relay rule information and the forwarding rule information include at least one of the following:
    上行数据过滤规则;Upstream data filtering rules;
    下行数据过滤规则;Downstream data filtering rules;
    上行数据转发规则;Upstream data forwarding rules;
    下行数据转发规则。Downstream data forwarding rules.
  11. 一种设备数据路径管控装置,包括:A device data path management and control device, including:
    第一传输模块,用于从第二网络功能接收第一信息,所述第一信息包括规则信息和规则事件信息;A first transmission module configured to receive first information from the second network function, where the first information includes rule information and rule event information;
    第一执行模块,用于根据所述第一信息执行以下至少一项:A first execution module, configured to execute at least one of the following according to the first information:
    基于所述规则信息,向第一设备发送中继规则信息;Based on the rule information, send relay rule information to the first device;
    基于所述规则事件信息,向第一设备发送中继规则事件信息;Based on the rule event information, send relay rule event information to the first device;
    基于所述规则信息,向第三网络功能配置转发规则信息;Based on the rule information, forward the rule information to a third network function configuration;
    基于所述规则事件信息,有效或无效所述转发规则信息的配置;Validate or invalidate the configuration of the forwarding rule information based on the rule event information;
    其中,所述中继规则信息用于指示所述第一设备转发移动网络与第三设备间的数据的规则,所述转发规则信息用于指示所述第三网络功能转发移动网络与数据网络间的数据的规则,所述规则事件信息用于指示所述规则信息 的有效或无效条件,所述中继规则事件信息用于指示所述中继规则信息的有效或无效条件,所述第三设备为通过所述第一设备接收来自移动网络侧的数据或向移动网络侧发送数据的设备。Wherein, the relay rule information is used to instruct the first device to forward the rules of data between the mobile network and the third device, and the forwarding rule information is used to instruct the third network function to forward the data between the mobile network and the data network. data rules, the rule event information is used to indicate the rule information Valid or invalid conditions, the relay rule event information is used to indicate the valid or invalid conditions of the relay rule information, and the third device receives data from the mobile network side through the first device or sends data to the mobile network side. A device that sends data on the network side.
  12. 一种设备数据路径管控方法,包括:A device data path management and control method, including:
    第一设备从移动网络侧接收第二信息,所述第二信息包括以下至少一项:中继规则信息和中继规则事件信息;终止中继指示;The first device receives second information from the mobile network side, where the second information includes at least one of the following: relay rule information and relay rule event information; termination of relay indication;
    根据所述第二信息,所述第一设备执行以下至少一项:According to the second information, the first device performs at least one of the following:
    基于所述中继规则信息转发所述移动网络与第三设备间的数据;Forward data between the mobile network and the third device based on the relay rule information;
    基于所述中继规则事件信息,有效或无效所述中继规则信息;Validate or invalidate the relay rule information based on the relay rule event information;
    基于所述终止中继指示,终止转发移动网络与第三设备间的数据;其中,所述第三设备为通过所述第一设备接收来自移动网络侧的数据或向移动网络侧发送数据的设备。Based on the termination relay indication, terminate the forwarding of data between the mobile network and the third device; wherein the third device is a device that receives data from the mobile network side or sends data to the mobile network side through the first device. .
  13. 根据权利要求12所述的方法,其中,所述中继规则事件信息包括与所述中继规则信息对应的以下至少一项:The method according to claim 12, wherein the relay rule event information includes at least one of the following corresponding to the relay rule information:
    持续时间信息;有效时间信息;无效时间信息。Duration information; valid time information; invalid time information.
  14. 根据权利要求13的所述方法,其中,在所述中继规则事件信息包括持续时间信息的情况下,所述基于所述中继规则事件信息,有效或无效所述中继规则信息,包括以下至少一项:The method of claim 13, wherein, in the case where the relay rule event information includes duration information, the valid or invalid relay rule information based on the relay rule event information includes the following: At least one:
    在基于所述持续时间信息确定的有效期有效的情况下,所述第一设备启用所述中继规则信息;If the validity period determined based on the duration information is valid, the first device enables the relay rule information;
    在基于所述持续时间信息确定的有效期失效的情况下,所述第一设备停用所述中继规则信息。In the event that the validity period determined based on the duration information expires, the first device deactivates the relay rule information.
  15. 根据权利要求13所述的方法,其中,在所述中继规则事件信息包括有效时间信息的情况下,所述基于所述中继规则事件信息,有效或无效所述中继规则信息,包括:The method according to claim 13, wherein, in the case where the relay rule event information includes valid time information, validating or invalidating the relay rule information based on the relay rule event information includes:
    在当前时间到达所述有效时间信息确定的时间或时间范围的情况下,所述第一设备启用所述中继规则信息。When the current time reaches the time or time range determined by the valid time information, the first device enables the relay rule information.
  16. 根据权利要求13所述的方法,其中,在所述中继规则事件信息包括中继无效时间信息的情况下,所述基于所述中继规则事件信息,有效或无效所述中继规则信息,包括:The method of claim 13, wherein, in the case where the relay rule event information includes relay invalidation time information, validating or invalidating the relay rule information based on the relay rule event information, include:
    在当前时间到达所述中继无效时间信息确定的时间或时间范围的情况下,所述第一设备停用所述中继规则信息。When the current time reaches the time or time range determined by the relay invalid time information, the first device deactivates the relay rule information.
  17. 根据权利要求12所述的方法,其中,所述中继规则信息包括以下至少一项:The method according to claim 12, wherein the relay rule information includes at least one of the following:
    上行数据过滤规则; Upstream data filtering rules;
    下行数据过滤规则;Downstream data filtering rules;
    上行数据转发规则;Upstream data forwarding rules;
    下行数据转发规则。Downstream data forwarding rules.
  18. 根据权利要求12所述的方法,其中,在第一设备从移动网络侧接收第二信息之前,所述方法还包括:The method according to claim 12, wherein before the first device receives the second information from the mobile network side, the method further includes:
    向第二设备或第二网络功能发送第四信息,所述第四信息包括数据转发的规则事件信息。Send fourth information to the second device or the second network function, where the fourth information includes rule event information for data forwarding.
  19. 根据权利要求18所述的方法,其中,所述规则事件信息从所述第三设备接收。The method of claim 18, wherein the rule event information is received from the third device.
  20. 根据权利要求18所述的方法,其中,所述规则事件信息包括以下至少一项:The method according to claim 18, wherein the rule event information includes at least one of the following:
    持续时间信息、有效时间信息、无效时间信息、违规访问指示、违规访问次数。Duration information, valid time information, invalid time information, illegal access instructions, and number of illegal accesses.
  21. 根据权利要求20所述的方法,其中,所述违规访问指示用于指示在检测到与规则信息不匹配的数据的情况下,指示所述第一设备终止转发移动网络与第三设备间的数据。The method according to claim 20, wherein the violation access indication is used to instruct the first device to terminate forwarding data between the mobile network and the third device when data that does not match the rule information is detected. .
  22. 根据权利要求20所述的方法,其中,所述违规访问次数用于指示在检测到与规则信息不匹配的数据超过所述违规访问次数的情况下,指示所述第一设备终止转发移动网络与第三设备间的数据。The method according to claim 20, wherein the number of violation accesses is used to indicate that when data that does not match the rule information is detected to exceed the number of violation accesses, instruct the first device to terminate forwarding the mobile network and Data between third devices.
  23. 一种设备数据路径管控装置,包括:A device data path management and control device, including:
    第二传输模块,用于从移动网络侧接收第二信息,所述第二信息包括以下至少一项:中继规则信息和中继规则事件信息;终止中继指示;The second transmission module is configured to receive second information from the mobile network side, where the second information includes at least one of the following: relay rule information and relay rule event information; termination of relay indication;
    第二执行模块,用于根据所述第二信息执行以下至少一项:A second execution module, configured to execute at least one of the following according to the second information:
    基于所述中继规则信息转发所述移动网络与第三设备间的数据;Forward data between the mobile network and the third device based on the relay rule information;
    基于所述中继规则事件信息,有效或无效所述中继规则信息;Validate or invalidate the relay rule information based on the relay rule event information;
    基于所述终止中继指示,终止转发移动网络与第三设备间的数据;其中,所述第三设备为通过所述设备接入管控装置接收来自移动网络侧的数据或向移动网络侧发送数据的设备。Based on the termination relay indication, terminate the forwarding of data between the mobile network and the third device; wherein the third device receives data from the mobile network side or sends data to the mobile network side through the device access management and control device. device of.
  24. 一种设备数据路径管控方法,包括:A device data path management and control method, including:
    第二网络功能向第一网络功能发送第一信息,所述第一信息包括规则信息和规则事件信息。The second network function sends first information to the first network function, where the first information includes rule information and rule event information.
  25. 根据权利要求24所述的方法,其中,所述规则事件信息包括以下至少一项:The method according to claim 24, wherein the rule event information includes at least one of the following:
    持续时间信息、有效时间信息、无效时间信息、违规访问指示、违规访问次数。 Duration information, valid time information, invalid time information, illegal access instructions, and number of illegal accesses.
  26. 根据权利要求24或25所述的方法,其中,所述规则信息包括以下至少一项:The method according to claim 24 or 25, wherein the rule information includes at least one of the following:
    中继规则信息、转发规则信息;Relay rule information and forwarding rule information;
    其中,所述中继规则信息指示第一设备转发移动网络与第三设备间的数据的规则,所述转发规则信息用于指示第三网络功能转发移动网络与数据网络间的数据的规则,所述第三设备为通过所述第一设备接收来自移动网络侧的数据或向移动网络侧发送数据的设备。Wherein, the relay rule information indicates the rules for the first device to forward data between the mobile network and the third device, and the forwarding rule information is used to indicate the rules for the third network function to forward data between the mobile network and the data network, so The third device is a device that receives data from the mobile network side or sends data to the mobile network side through the first device.
  27. 根据权利要求26所述的方法,其中,所述中继规则信息和所述转发规则信息包括以下至少一项:The method according to claim 26, wherein the relay rule information and the forwarding rule information include at least one of the following:
    上行数据过滤规则;Upstream data filtering rules;
    下行数据过滤规则;Downstream data filtering rules;
    上行数据转发规则;Upstream data forwarding rules;
    下行数据转发规则。Downstream data forwarding rules.
  28. 根据权利要求24所述的方法,其中,所述规则事件信息从第一设备或第二设备接收。The method of claim 24, wherein the rule event information is received from the first device or the second device.
  29. 一种设备数据路径管控装置,包括:A device data path management and control device, including:
    第三执行模块,用于获取第一信息;The third execution module is used to obtain the first information;
    第三传输模块,用于向第一网络功能发送第一信息,所述第一信息包括规则信息和规则事件信息。The third transmission module is configured to send first information to the first network function, where the first information includes rule information and rule event information.
  30. 一种设备数据路径管控方法,包括:A device data path management and control method, including:
    第三设备向第一设备或第二设备发送第三信息,所述第三信息包括数据转发的规则事件信息;The third device sends third information to the first device or the second device, where the third information includes rule event information for data forwarding;
    其中,所述规则事件信息用于指示确定所述数据转发有效或失效的相关信息;所述第三设备为通过所述第一设备接收来自移动网络侧的数据或向移动网络侧发送数据的设备。Wherein, the rule event information is used to indicate relevant information for determining whether the data forwarding is valid or invalid; the third device is a device that receives data from the mobile network side through the first device or sends data to the mobile network side. .
  31. 根据权利要求30所述的方法,其中,所述规则事件信息包括以下至少一项:The method according to claim 30, wherein the rule event information includes at least one of the following:
    持续时间信息、有效时间信息、无效时间信息、违规访问指示、违规访问次数。Duration information, valid time information, invalid time information, illegal access instructions, and number of illegal accesses.
  32. 根据权利要求31所述的方法,其中,所述违规访问指示用于指示在检测到与规则信息不匹配的数据的情况下,指示所述第一设备终止转发移动网络与所述第三设备间的数据。The method according to claim 31, wherein the violation access indication is used to instruct the first device to terminate forwarding between the mobile network and the third device when data that does not match the rule information is detected. The data.
  33. 根据权利要求31所述的方法,其中,所述违规访问次数用于指示在检测到与规则信息不匹配的数据超过所述违规访问次数的情况下,指示所述第一设备终止转发移动网络与所述第三设备间的数据。 The method according to claim 31, wherein the number of violation accesses is used to indicate that when data that does not match the rule information is detected to exceed the number of violation accesses, instruct the first device to terminate forwarding the mobile network and Data between the third devices.
  34. 一种设备数据路径管控装置,包括:A device data path management and control device, including:
    第四执行模块,用于获取第三信息;The fourth execution module is used to obtain the third information;
    第四传输模块,用于向第一设备或第二设备发送所述第三信息,所述第三信息包括数据转发的规则事件信息;A fourth transmission module, configured to send the third information to the first device or the second device, where the third information includes rule event information for data forwarding;
    其中,所述规则事件信息用于指示确定所述数据转发有效或失效的相关信息;所述设备接入管控装置为通过所述第一设备接收来自移动网络侧的数据或向移动网络侧发送数据的设备。Wherein, the rule event information is used to indicate relevant information for determining whether the data forwarding is valid or invalid; the device access management and control device is to receive data from the mobile network side through the first device or send data to the mobile network side. device of.
  35. 一种设备数据路径管控方法,包括:A device data path management and control method, including:
    第二设备向第二网络功能发送第四信息,所述第四信息包括数据转发的规则事件信息;所述规则事件信息用于指示确定所述数据转发有效或失效的相关信息。The second device sends fourth information to the second network function, where the fourth information includes rule event information for data forwarding; the rule event information is used to indicate relevant information for determining whether the data forwarding is valid or invalid.
  36. 根据权利要求35所述的方法,其特征大于,所述规则事件信息包括以下至少一项:The method according to claim 35, characterized in that the rule event information includes at least one of the following:
    持续时间信息、有效时间信息、无效时间信息、违规访问指示、违规访问次数。Duration information, valid time information, invalid time information, illegal access instructions, and number of illegal accesses.
  37. 根据权利要求35所述的方法,其中,所述规则事件信息从第三设备或第一设备接收;The method of claim 35, wherein the rule event information is received from a third device or the first device;
    其中,所述第三设备为通过所述第一设备接收来自移动网络侧的数据或向移动网络侧发送数据的设备。Wherein, the third device is a device that receives data from the mobile network side or sends data to the mobile network side through the first device.
  38. 根据权利要求36所述的方法,其中,所述违规访问指示用于指示在检测到与规则信息不匹配的数据的情况下,指示第一设备终止转发移动网络与第三设备间的数据。The method according to claim 36, wherein the violation access indication is used to instruct the first device to terminate forwarding data between the mobile network and the third device when data that does not match the rule information is detected.
  39. 根据权利要求36所述的方法,其中,所述违规访问次数用于指示在检测到与规则信息不匹配的数据超过所述违规访问次数的情况下,指示第一设备终止转发移动网络与第三设备间的数据。The method according to claim 36, wherein the number of violation accesses is used to indicate that when data that does not match the rule information is detected to exceed the number of violation accesses, instruct the first device to terminate forwarding the mobile network and the third party. data between devices.
  40. 一种设备数据路径管控装置,包括:A device data path management and control device, including:
    第五执行模块,用于获取第四信息;The fifth execution module is used to obtain the fourth information;
    第五传输模块,用于向第二网络功能发送第四信息,所述第四信息包括数据转发的规则事件信息;所述规则事件信息用于指示确定所述数据转发有效或失效的相关信息。The fifth transmission module is configured to send fourth information to the second network function, where the fourth information includes rule event information for data forwarding; the rule event information is used to indicate relevant information for determining whether the data forwarding is valid or invalid.
  41. 一种终端,包括处理器和存储器,所述存储器存储可在所述处理器上运行的程序或指令,所述程序或指令被所述处理器执行时实现如权利要求12至22任一项所述的设备数据路径管控方法,或者实现如权利要求30至33任一项所述的设备数据路径管控方法,或者实现如权利要求35至39任一项所述的设备数据路径管控方法的步骤。 A terminal, including a processor and a memory, the memory stores programs or instructions that can be run on the processor, and when the programs or instructions are executed by the processor, the implementation as claimed in any one of claims 12 to 22 is provided. The device data path management and control method described above, or the steps of implementing the device data path management and control method as described in any one of claims 30 to 33, or the steps of implementing the device data path management and control method as described in any one of claims 35 to 39.
  42. 一种网络侧设备,包括处理器和存储器,所述存储器存储可在所述处理器上运行的程序或指令,所述程序或指令被所述处理器执行时实现如权利要求1至10任一项所述的设备数据路径管控方法,或者实现如权利要求24至28任一项所述的设备数据路径管控方法的步骤。A network side device, including a processor and a memory. The memory stores programs or instructions that can be run on the processor. When the program or instructions are executed by the processor, any one of claims 1 to 10 is implemented. The device data path management and control method described in claim 24, or the steps to implement the device data path management and control method described in any one of claims 24 to 28.
  43. 一种可读存储介质,所述可读存储介质上存储程序或指令,所述程序或指令被处理器执行时实现如权利要求1-10任一项所述的设备数据路径管控方法,或者实现如权利要求12至22任一项所述的设备数据路径管控方法,或者实现如权利要求24至28任一项所述的设备数据路径管控方法,或者实现如权利要求30至33任一项所述的设备数据路径管控方法,或者实现如权利要求35至39任一项所述的设备数据路径管控方法的步骤。 A readable storage medium on which programs or instructions are stored. When the programs or instructions are executed by a processor, the device data path management and control method as described in any one of claims 1-10 is implemented, or the The device data path management and control method according to any one of claims 12 to 22, or the device data path management and control method according to any one of claims 24 to 28, or the device data path management and control method according to any one of claims 30 to 33. The device data path management and control method described above, or the steps to implement the device data path management and control method as described in any one of claims 35 to 39.
PCT/CN2023/106235 2022-07-13 2023-07-07 Device data path management and control method, device, terminal, and network side device WO2024012356A1 (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN202210821333.5A CN117440466A (en) 2022-07-13 2022-07-13 Equipment data path management and control method, equipment, terminal and network side equipment
CN202210821333.5 2022-07-13

Publications (1)

Publication Number Publication Date
WO2024012356A1 true WO2024012356A1 (en) 2024-01-18

Family

ID=89535593

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2023/106235 WO2024012356A1 (en) 2022-07-13 2023-07-07 Device data path management and control method, device, terminal, and network side device

Country Status (2)

Country Link
CN (1) CN117440466A (en)
WO (1) WO2024012356A1 (en)

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101282569A (en) * 2007-04-03 2008-10-08 中兴通讯股份有限公司 Self-adaption management method for wireless transmission network containing base station and wireless relay station
CN101741452A (en) * 2008-11-07 2010-06-16 华为技术有限公司 Relay transmission method and network node
CN105357757A (en) * 2015-09-25 2016-02-24 宇龙计算机通信科技(深圳)有限公司 Communication resource allocation method and device
US20200351651A1 (en) * 2019-05-03 2020-11-05 Samsung Electronics Co., Ltd. Method and apparatus for providing bundle information

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101282569A (en) * 2007-04-03 2008-10-08 中兴通讯股份有限公司 Self-adaption management method for wireless transmission network containing base station and wireless relay station
CN101741452A (en) * 2008-11-07 2010-06-16 华为技术有限公司 Relay transmission method and network node
CN105357757A (en) * 2015-09-25 2016-02-24 宇龙计算机通信科技(深圳)有限公司 Communication resource allocation method and device
US20200351651A1 (en) * 2019-05-03 2020-11-05 Samsung Electronics Co., Ltd. Method and apparatus for providing bundle information

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
VIVO: "New Key Issue for controlling of remote provisioning", 3GPP TSG-SA3 MEETING #107-E-AD HOC, S3-221507, 20 June 2022 (2022-06-20), XP052195821 *

Also Published As

Publication number Publication date
CN117440466A (en) 2024-01-23

Similar Documents

Publication Publication Date Title
KR101745221B1 (en) Automatic sanitization of data on a mobile device in a network environment
WO2024007975A1 (en) Call capability monitoring method and apparatus, and terminal and readable storage medium
WO2024012356A1 (en) Device data path management and control method, device, terminal, and network side device
CN106454839A (en) Network access method and apparatus of intelligent terminal
WO2024022182A1 (en) Information query method and apparatus, terminal, and network side device
WO2024061091A1 (en) Network communication method and apparatus, and network-side device, terminal and medium
WO2023179595A1 (en) Session channel establishment method and apparatus for non-3gpp device, and device
WO2024022210A1 (en) Pegc registration methods, apparatus, and communication device
WO2024022161A1 (en) Pin device registration method and apparatus, and communication device
WO2023207984A1 (en) Behavior processing method and apparatus, and terminal, network-side device and medium
WO2024017181A1 (en) Device authorization method and apparatus, and network-side device
WO2024061144A1 (en) Method and apparatus for configuring network routing, and network-side device and terminal
WO2023143450A1 (en) Method for configuring data processing rule, and terminal and network-side device
WO2023143423A1 (en) Information acquisition, storage and reporting method and device, terminal, and network function
WO2023143416A1 (en) Information processing method, terminal, and network function
WO2023143453A1 (en) Direct-connectivity air interface configuration method, and terminal and network-side device
WO2023185877A1 (en) Routing processing method, terminal and network side device
WO2023143436A1 (en) Data forwarding method and apparatus, and terminal device and network device
WO2024017191A1 (en) Interaction method and apparatus, and device and storage medium
WO2024061256A1 (en) Forwarding rule configuration method and apparatus, terminal, and network side device
WO2023143411A1 (en) Device authentication methods, apparatus and communication device
WO2023143420A1 (en) Device management method and apparatus
WO2024012279A1 (en) Information transmission method and apparatus, and device
WO2023143414A1 (en) Data transmission method and apparatus, configuration method and apparatus, and terminal and network-side device
WO2024067331A1 (en) Device switching method in personal internet of things network, and communication method and device

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 23838848

Country of ref document: EP

Kind code of ref document: A1