WO2024020751A1 - 一种第三方服务管理方法/装置/设备及存储介质 - Google Patents

一种第三方服务管理方法/装置/设备及存储介质 Download PDF

Info

Publication number
WO2024020751A1
WO2024020751A1 PCT/CN2022/107714 CN2022107714W WO2024020751A1 WO 2024020751 A1 WO2024020751 A1 WO 2024020751A1 CN 2022107714 W CN2022107714 W CN 2022107714W WO 2024020751 A1 WO2024020751 A1 WO 2024020751A1
Authority
WO
WIPO (PCT)
Prior art keywords
network element
party service
party
management
nef
Prior art date
Application number
PCT/CN2022/107714
Other languages
English (en)
French (fr)
Inventor
陈栋
何智斌
Original Assignee
北京小米移动软件有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 北京小米移动软件有限公司 filed Critical 北京小米移动软件有限公司
Priority to PCT/CN2022/107714 priority Critical patent/WO2024020751A1/zh
Publication of WO2024020751A1 publication Critical patent/WO2024020751A1/zh

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W60/00Affiliation to network, e.g. registration; Terminating affiliation with the network, e.g. de-registration

Definitions

  • the present disclosure relates to the field of communication technology, and in particular, to a third-party service management method/device/equipment and a storage medium.
  • the new service may be provided by nodes within the network or by a third party outside the network. Among them, when the new service is provided by a third party, there is currently no method for the network to manage and call the service provided by the third party.
  • the third-party service management method/device/equipment and storage medium proposed in this disclosure are used to manage third-party services provided by third-party applications.
  • embodiments of the present disclosure provide a third-party service management method, which is executed by an NEF network element and includes:
  • the NEF network element can manage the third-party service.
  • the third-party service can be registered and/or deregistered, so that the NEF network element can know what the third-party application can provide. Which third-party services are available, the network can later call the third-party services through NEF network elements, which improves the richness of network services.
  • embodiments of the present disclosure provide a third-party service management method, which is executed by an NRF network element and includes:
  • embodiments of the present disclosure provide a third-party service management method, which is executed by an AF network element and includes:
  • embodiments of the present disclosure provide a communication device, which is configured in an NEF network element and includes:
  • a transceiver module configured to receive a first management request for managing third-party services sent by the application function AF network element, where the first management request indicates third-party services provided by a third-party application;
  • a management module configured to manage the third-party service based on the first management request
  • the transceiver module is also used to return management results to the AF network element.
  • embodiments of the present disclosure provide a communication device, which is configured in an NRF network element and includes:
  • a transceiver module configured to receive a second management request sent by the NEF network element for managing third-party services, where the second management request indicates third-party services provided by a third-party application;
  • a management module configured to manage the third-party service based on the second management request
  • the transceiver module is also used to return management results to the NEF network element.
  • an embodiment of the present disclosure provides a communication device configured in an AF network element, including
  • a transceiver module configured to send a first management request for managing third-party services to the NEF network element, where the first management request indicates third-party services provided by a third-party application;
  • the transceiver module is also used to receive the management results returned by the NEF network element.
  • an embodiment of the present disclosure provides a communication system, which includes:
  • the first network element is configured to send a first management request for managing third-party services, where the first management request indicates third-party services provided by a third-party application;
  • a second network element configured to receive the first management request for managing third-party services and manage the third-party service based on the first management request
  • the second network element is further configured to send a second management request for managing third-party services, where the second management request indicates third-party services provided by a third-party application;
  • the third network element is configured to receive the second management request for managing third-party services, manage the third-party service based on the second management request, and then return the management result to the second network element. ;
  • the second network element is also configured to return a management result to the first network element
  • the first network element is also configured to receive the management result returned by the second network element.
  • an embodiment of the present disclosure provides a communication device.
  • the communication device includes a processor.
  • the processor calls a computer program in a memory, it executes the method described in the first aspect.
  • an embodiment of the present disclosure provides a communication device.
  • the communication device includes a processor.
  • the processor calls a computer program in a memory, it executes the method described in the second aspect.
  • an embodiment of the present disclosure provides a communication device.
  • the communication device includes a processor.
  • the processor calls a computer program in a memory, it executes the method described in the third aspect.
  • an embodiment of the present disclosure provides a communication device.
  • the communication device includes a processor and a memory, and a computer program is stored in the memory; the processor executes the computer program stored in the memory, so that the communication device Execute the method described in the first aspect above.
  • an embodiment of the present disclosure provides a communication device.
  • the communication device includes a processor and a memory, and a computer program is stored in the memory; the processor executes the computer program stored in the memory, so that the communication device Perform the method described in the second aspect above.
  • an embodiment of the present disclosure provides a communication device.
  • the communication device includes a processor and a memory, and a computer program is stored in the memory; the processor executes the computer program stored in the memory, so that the communication device Perform the method described in the third aspect above.
  • an embodiment of the present disclosure provides a communication device.
  • the device includes a processor and an interface circuit.
  • the interface circuit is used to receive code instructions and transmit them to the processor.
  • the processor is used to run the code instructions to cause The device performs the method described in the first aspect above.
  • an embodiment of the present disclosure provides a communication device.
  • the device includes a processor and an interface circuit.
  • the interface circuit is used to receive code instructions and transmit them to the processor.
  • the processor is used to run the code instructions to cause The device performs the method described in the second aspect above.
  • an embodiment of the present disclosure provides a communication device.
  • the device includes a processor and an interface circuit.
  • the interface circuit is used to receive code instructions and transmit them to the processor.
  • the processor is used to run the code instructions to cause The device performs the method described in the third aspect above.
  • an embodiment of the present disclosure provides a communication system, which includes the communication device described in the fourth aspect to the communication device described in the sixth aspect, or the system includes the communication device described in the eighth aspect to The communication device according to the tenth aspect, or the system includes the communication device according to the eleventh aspect to the communication device according to the thirteenth aspect, or the system includes the communication device according to the fourteenth aspect through the communication device according to the thirteenth aspect.
  • the communication device according to the sixteenth aspect includes the communication device described in the fourth aspect to the communication device described in the sixth aspect, or the system includes the communication device described in the eighth aspect to The communication device according to the tenth aspect, or the system includes the communication device according to the eleventh aspect to the communication device according to the thirteenth aspect, or the system includes the communication device according to the fourteenth aspect through the communication device according to the thirteenth aspect.
  • the communication device according to the sixteenth aspect includes the communication device described in the fourth aspect to the communication device described in the sixth aspect, or the system includes the communication device described in the eighth aspect to The communication device according to
  • embodiments of the present invention provide a computer-readable storage medium for storing instructions used by the above-mentioned network device.
  • the terminal device is caused to execute the above-mentioned first to third aspects. The method described in any of the aspects.
  • the present disclosure also provides a computer program product including a computer program, which, when run on a computer, causes the computer to execute the method described in any one of the above-mentioned first to third aspects.
  • the present disclosure provides a chip system, which includes at least one processor and an interface for supporting a network device to implement the functions involved in the method described in any one of the first to third aspects, For example, at least one of the data and information involved in the above method is determined or processed.
  • the chip system further includes a memory, and the memory is used to store necessary computer programs and data of the source secondary node.
  • the chip system may be composed of chips, or may include chips and other discrete devices.
  • the present disclosure provides a computer program that, when run on a computer, causes the computer to perform the method described in any one of the above-mentioned first to third aspects.
  • Figure 1 is a schematic architectural diagram of a communication system provided by an embodiment of the present disclosure
  • Figure 2 is a schematic flowchart of a third-party service management method provided by another embodiment of the present disclosure.
  • Figure 3 is a schematic flowchart of a third-party service management method provided by yet another embodiment of the present disclosure.
  • Figure 4 is a schematic flowchart of a third-party service management method provided by yet another embodiment of the present disclosure.
  • Figure 5 is a schematic flowchart of a third-party service management method provided by another embodiment of the present disclosure.
  • Figure 6 is a schematic flowchart of a third-party service management method provided by yet another embodiment of the present disclosure.
  • Figure 7 is a schematic flowchart of a third-party service management method provided by yet another embodiment of the present disclosure.
  • Figure 8 is a schematic flowchart of a third-party service management method provided by an embodiment of the present disclosure.
  • Figure 9 is a schematic flowchart of a third-party service management method provided by another embodiment of the present disclosure.
  • Figure 10 is a schematic flowchart of a third-party service management method provided by yet another embodiment of the present disclosure.
  • Figure 11 is a schematic flowchart of a third-party service management method provided by yet another embodiment of the present disclosure.
  • Figure 12 is a schematic flowchart of a third-party service management method provided by another embodiment of the present disclosure.
  • Figure 13 is a schematic flowchart of a third-party service management method provided by yet another embodiment of the present disclosure.
  • Figure 14 is a schematic flowchart of a third-party service management method provided by yet another embodiment of the present disclosure.
  • Figure 15 is a schematic flowchart of a third-party service management method provided by yet another embodiment of the present disclosure.
  • Figure 16 is a schematic flowchart of a third-party service management method provided by yet another embodiment of the present disclosure.
  • Figure 17 is a schematic flowchart of an interactive method for third-party service registration provided by another embodiment of the present disclosure.
  • Figure 18 is a schematic flowchart of an interactive method for third-party service logout provided by yet another embodiment of the present disclosure.
  • Figure 19 is a schematic structural diagram of a communication device provided by an embodiment of the present disclosure.
  • Figure 20 is a schematic structural diagram of a communication device provided by another embodiment of the present disclosure.
  • Figure 21a is a schematic structural diagram of a communication device provided by an embodiment of the present disclosure.
  • Figure 21b is a schematic structural diagram of a communication system provided by an embodiment of the present disclosure.
  • Figure 22 is a block diagram of a user equipment provided by an embodiment of the present disclosure.
  • Figure 23 is a block diagram of a network side device provided by an embodiment of the present disclosure.
  • first, second, third, etc. may be used to describe various information in the embodiments of the present disclosure, the information should not be limited to these terms. These terms are only used to distinguish information of the same type from each other.
  • first information may also be called second information, and similarly, the second information may also be called first information.
  • the words "if” and “if” as used herein may be interpreted as "when” or "when” or "in response to determination.”
  • AI is a new technical science that studies and develops theories, methods, technologies and application systems for simulating, extending and expanding human intelligence.
  • the NRF network element stores and maintains NF information in the network, and provides NF discovery/selection/subscription functions, that is, you can request certain NF information, such as IP address, from NRF.
  • the NEF network element securely opens the services provided by other NFs in the network to third parties, AF, etc., and securely transmits the information sent by the AF to the network, functioning as a service layer security gateway.
  • AF network element provides application network elements, and the authorization server can be deployed as AF.
  • the various network elements/functions involved in the embodiments of the present disclosure can be either an independent hardware device or a function implemented by computer code within the hardware device. This is not the case in the embodiments of the present disclosure. limited.
  • the 5G service-oriented network architecture abstracts the functions of network elements into multiple services. Among them, compared with the traditional network architecture, two new network elements, NEF network element and NRF network element, are added to the 5G service-oriented architecture.
  • NEF can safely provide 3GPP network element services and capabilities to the outside world, and can be regarded as a security gateway.
  • the functions of the internal network that the outside world wants to call must be transferred through NEF to prevent the direct exposure of internal network elements and cause security problems.
  • the outside world here can be third parties, AF, edge computing network elements of the operator's network, etc.
  • Figure 1 is a schematic diagram of a 5G service-based network architecture provided by an embodiment of the present disclosure.
  • Figure 1 includes the network elements included in the 5G service-oriented network architecture and the interfaces used for communication between each network element.
  • FIG. 2 is a schematic flowchart of a third-party service management method provided by an embodiment of the present disclosure. The method is executed by the NEF network element. As shown in Figure 2, the third-party service management method may include the following steps:
  • Step 201 Receive the first management request sent by the AF (Application Function) network element for managing third-party services.
  • AF Application Function
  • the first management request indicates third-party services that can be provided by a third-party application.
  • the third-party application may be an application other than the terminal device, the network device, and the network elements of the network control plane.
  • the third-party service may be, for example, a game service, a voice service, etc. provided by the third-party application.
  • the first management request may be sent by a third-party application to the NEF network element through the AF network element.
  • the above-mentioned first management request may be a first registration request for registering a third-party service and/or a first deregistration request for deregistering the third-party service. This part will be introduced in detail in subsequent embodiments.
  • the NEF network element can receive the first management request for managing third-party services sent by the AF network element through the SBI (Southbound Interface) interface.
  • Step 202 Manage the third-party service based on the first management request.
  • the NEF network element when the first management request is a first registration request, the NEF network element will register and manage the third-party service based on the first registration request. And, in another embodiment of the present disclosure, when the first management request is a first logout request, the NEF network element performs logout management on the third-party service based on the first logout request.
  • the specific registration management and deregistration management will be introduced in detail in subsequent embodiments.
  • Step 203 Return the management result to the AF network element.
  • the management result may include a registration success response or a registration failure response.
  • the management result may include a logout success response or a logout failure response.
  • the NEF network element will receive the first management request sent by the AF network element for managing the third-party service, and the first management request indicates the third-party service management method.
  • Third-party services provided by third-party applications will manage the third-party services based on the first management request and return the management results to the AF network element. That is to say, in the third-party service management method provided by this disclosure, the NEF network element can manage the third-party service.
  • the third-party service can be registered and/or deregistered, so that the NEF network element can know the third-party service.
  • the network can subsequently call the third-party services through the NEF network element, which improves the richness of network services.
  • FIG 3 is a schematic flowchart of a third-party service management method provided by an embodiment of the present disclosure. The method is executed by the NEF network element. As shown in Figure 3, the third-party service management method may include the following steps:
  • Step 301 Receive the first registration request sent by the AF network element for registering a third-party service.
  • the first registration request may be sent to the NEF network element through the AF network element when a third-party application needs to register a third-party service.
  • the above-mentioned first registration request may include registration information of the third-party service requesting registration.
  • the above-mentioned registration information may include at least one of the following:
  • the ID (Identifier, identification) of the NF (Network Function) corresponding to the third-party service;
  • the ID of the PLMN Public Land Mobile Network
  • PLMN Public Land Mobile Network
  • the NF type corresponding to the above-mentioned third-party service may be the NF type to which the third-party service belongs, and the NF type may include an AI service type, a perception service type, etc.
  • the NF type corresponding to the third-party service may be an AI service type.
  • the NF support business corresponding to the above-mentioned third-party service may include at least one of the following:
  • the NF support service corresponding to the third-party service may include the voice service and the actual execution policy when executing the voice service (such as the actual charging policy when actually executing the voice service, etc.).
  • Step 302 Determine whether the third-party service meets the authorization conditions based on the registration information of the third-party service.
  • the method for the NEF network element to determine whether the third-party service meets the authorization conditions based on the registration information of the third-party service may include the following steps:
  • Step 1 Determine whether the third-party application is eligible for registration.
  • a list is stored in the NEF network element, and the list includes IDs of PLMNs corresponding to third-party applications capable of providing services to the NF network element. Based on this, the NEF network element can search whether the list includes the ID of the PLMN corresponding to the third-party application in the first registration request. If the list does not include the ID of the PLMN in the first registration request, it means that the ID of the third-party application in the first registration request is not included in the list.
  • step 2 is further performed.
  • Step 2 Determine whether the third-party service is eligible for registration.
  • whether the third-party service is qualified for registration can be determined based on the NF type corresponding to the third-party service in the first registration request and the NF support service corresponding to the third-party service.
  • PCF Policy Control Function
  • the standard execution strategy is specifically a standard execution strategy defined for each business.
  • the standard execution measurement corresponding to the voice service may be a standard charging policy.
  • the above-mentioned access strategy is used to determine whether the third-party service is qualified for registration; wherein, the access strategy specifically includes: the actual execution strategy corresponding to the business that needs to be performed when realizing the third-party service to be registered and the implementation strategy to be registered If the deviation between the standard execution strategies corresponding to the business that needs to be executed when the third-party service is to be registered is less than the preset threshold, it means that the third-party service to be registered is qualified for registration; if the business that needs to be executed when the third-party service to be registered is implemented, If the deviation between the corresponding actual execution strategy and the standard execution strategy corresponding to the business required to implement the third-party service to be registered is not less than the preset threshold, it means that the third-party service to be registered is not qualified for registration.
  • the NEF network element can be based on the NF type corresponding to the third-party service included in the first registration request. Determine the standard execution strategy corresponding to the third-party service requested by the first registration request based on the business that needs to be executed when implementing the third-party service, and then execute the standard based on the standard execution policy corresponding to the third-party service requested by the first registration request.
  • the policy and the above-mentioned access policy determine whether the third-party service requested for registration by the first registration request is qualified for registration.
  • condition (1) when it is determined whether the third-party service requested for registration by the first registration request is qualified for registration, it is determined that it meets the authorization conditions; when it is determined that the third-party service requested for registration by the first registration request is not qualified for registration, it is determined that it does not meet the authorization conditions.
  • Step 303 In response to determining that the third-party service meets the authorization conditions, store the ID of the NF corresponding to the third-party service.
  • the NEF network element in response to determining that the third-party service meets the authorization conditions, can associate and store the ID of the NF corresponding to the third-party service and the ID of the PLMN, so that when the subsequent NRF network element After the third-party service is successfully registered, the NEF network element can call the third-party service based on the ID of the PLMN corresponding to the third-party application and the ID of the NF corresponding to the third-party service.
  • Step 304 Send a second registration request for registering a third-party service to the NRF network element.
  • the second registration request may include registration information and NEF ID.
  • the NEF network element may send a second registration request for registering a third-party service to the NRF network element through Nnrf_NFManagement_NFRegister.
  • the NRF network element after the NRF network element receives the second registration request for registering a third-party service, it can complete the registration of the third-party service according to the registration information and NEF ID included in the second registration request. Service registration management.
  • Step 305 Receive the registration success response sent by the NRF network element.
  • the registration success response is used to indicate that the third-party service has completed registration on the NRF network element.
  • Step 306 Return a registration success response to the AF network element.
  • the registration success response is used to indicate that the third-party service has been successfully registered.
  • the network device can subsequently call the third-party service.
  • the network device can subsequently call the AF network element.
  • the NEF network element will receive the first management request sent by the AF network element for managing the third-party service, and the first management request indicates the third-party service management method.
  • Third-party services provided by third-party applications will manage the third-party services based on the first management request and return the management results to the AF network element. That is to say, in the third-party service management method provided by this disclosure, the NEF network element can manage the third-party service.
  • the third-party service can be registered and/or deregistered, so that the NEF network element can know the third-party service.
  • the network can subsequently call the third-party services through the NEF network element, which improves the richness of network services.
  • FIG. 4 is a schematic flowchart of a third-party service management method provided by an embodiment of the present disclosure. The method is executed by the NEF network element. As shown in Figure 4, the third-party service management method may include the following steps:
  • Step 401 Receive the first registration request sent by the AF network element for registering a third-party service.
  • Step 402 Determine whether the third-party service meets the authorization conditions based on the registration information of the third-party service.
  • Step 403 In response to the registration information of the third-party service not meeting the authorization conditions, it is determined that the third-party service registration failed.
  • the registration information of the third-party service when the registration information of the third-party service does not meet the authorization conditions, it means that the third-party application may not be qualified for registration, or the third-party service may not be qualified for registration. In this case, If the third-party service requested to be registered by the first registration request cannot be registered, it is determined that the registration of the third-party service has failed.
  • Step 404 Return a registration failure response to the AF network element.
  • the registration failure response is used to indicate that the third-party service has not been successfully registered.
  • the NEF network element will receive the first management request sent by the AF network element for managing the third-party service, and the first management request indicates the third-party service management method.
  • Third-party services provided by third-party applications will manage the third-party services based on the first management request and return the management results to the AF network element. That is to say, in the third-party service management method provided by this disclosure, the NEF network element can manage the third-party service.
  • the third-party service can be registered and/or deregistered, so that the NEF network element can know the third-party service.
  • the network can subsequently call the third-party services through the NEF network element, which improves the richness of network services.
  • FIG. 5 is a schematic flowchart of a third-party service management method provided by an embodiment of the present disclosure. The method is executed by the NEF network element. As shown in Figure 5, the third-party service management method may include the following steps:
  • Step 501 Receive the first logout request sent by the AF network element for logging out of the third-party service.
  • the first logout request may be sent to the NEF network element through the AF network element when the third-party application needs to log out of a third-party service.
  • the above-mentioned first logout request may include logout information of the third-party service requesting logout.
  • the above-mentioned logout information includes at least one of the following:
  • the ID of the PLMN corresponding to the third-party application is the ID of the PLMN corresponding to the third-party application.
  • Step 502 Determine whether the third-party service meets the cancellation conditions based on the cancellation information of the third-party service.
  • the NEF network element searches whether it stores the ID of the NF in the above-mentioned first logout request. If the NEF network element stores the ID of the NF in the above-mentioned first logout request, it indicates the third-party service corresponding to the ID of the NF.
  • the third-party service can be deregistered to ensure that the third-party service meets the deregistration conditions; if the ID of the NF in the first deregistration request is not stored in the NEF network element, it means that the third-party service corresponding to the ID of the NF has not been stored in the NEF network element. registration, then at this time, the third-party service cannot be deregistered, and it is determined that the third-party service does not meet the deregistration conditions.
  • multiple third-party services will be registered for a third-party application.
  • the ID of one PLMN in the NEF network element will be associated with the IDs of multiple different NFs.
  • a third-party service may be registered to multiple different third-party applications.
  • the ID of one NF in the NEF network element may be associated with the IDs of multiple different PLMNs.
  • third-party application 1 and third-party application 2 both provide voice services and have been registered in the NEF network element.
  • the ID#1 of the PLMN corresponding to third-party application 1 in the NEF network element is associated with the voice service.
  • the ID of the corresponding NF is also associated with the ID of the NF corresponding to the voice service.
  • the deregistration request includes NF ID#2 and PLMN ID#2. Since there is no association between NF ID2 and PLMN ID#2 in the NEF network element, it is determined that the third-party service does not meet the deregistration conditions; if the above The first logout request in step 501 includes the ID#2 of the NF and the ID#1 of the PLMN. Since the ID#2 of the NF and the ID#1 of the PLMN are associated in the NEF network element, it is determined that the third-party service satisfies the Cancellation conditions.
  • Step 503 In response to determining that the third-party service satisfies the deregistration condition, send a second deregistration request for deregistering the third-party service to the NRF network element.
  • the above-mentioned second logout request may include logout information.
  • the NEF network element may send a second deregistration request for deregistering the third-party service to the NRF network element through Nnrf_NFManagement_NFDeregister.
  • the NRF network element after the NRF network element receives the second logout request for logging out of the third-party service, it can complete the logout management of the third-party service according to the logout message included in the second logout request. .
  • Step 504 In response to receiving the deregistration success response sent by the NRF network element, delete the ID of the NF corresponding to the third-party service.
  • the deregistration success response is used to indicate that the third-party service has completed deregistration at the NRF network element.
  • the NEF network element can delete the ID of the NF, or delete the ID of the NF. The association between the ID and the ID of the PLMN, thereby completing the deregistration of the third-party service in the NEF network element.
  • Step 505 Return a successful logout response to the AF network element.
  • the registration success response is used to indicate that the third-party service has been successfully deregistered. At this time, the network device can no longer call the third-party service.
  • the NEF network element will receive the first management request sent by the AF network element for managing the third-party service, and the first management request indicates the third-party service management method.
  • Third-party services provided by third-party applications will manage the third-party services based on the first management request and return the management results to the AF network element. That is to say, in the third-party service management method provided by this disclosure, the NEF network element can manage the third-party service.
  • the third-party service can be registered and/or deregistered, so that the NEF network element can know the third-party service.
  • the network can subsequently call the third-party services through the NEF network element, which improves the richness of network services.
  • FIG. 6 is a schematic flowchart of a third-party service management method provided by an embodiment of the present disclosure. The method is executed by the NEF network element. As shown in Figure 6, the third-party service management method may include the following steps:
  • Step 601 Receive the first logout request sent by the AF network element for logging out of the third-party service.
  • Step 602 Determine whether the third-party service meets the cancellation conditions based on the cancellation information of the third-party service.
  • steps 601 to 602 please refer to the above embodiment description, and the embodiments of the present disclosure will not be described again here.
  • Step 603 In response to the logout information of the third-party service not meeting the logout conditions, it is determined that the logout of the third-party service failed.
  • Step 604 Return a logout failure response to the AF network element.
  • the registration failure response is used to indicate that the third-party service has failed to log out.
  • the NEF network element will receive the first management request sent by the AF network element for managing the third-party service, and the first management request indicates the third-party service management method.
  • Third-party services provided by third-party applications will manage the third-party services based on the first management request and return the management results to the AF network element. That is to say, in the third-party service management method provided by this disclosure, the NEF network element can manage the third-party service.
  • the third-party service can be registered and/or deregistered, so that the NEF network element can know the third-party service.
  • the network can subsequently call the third-party services through the NEF network element, which improves the richness of network services.
  • FIG. 7 is a schematic flowchart of a third-party service management method provided by an embodiment of the present disclosure. The method is executed by the NRF network element. As shown in Figure 7, the third-party service management method may include the following steps:
  • Step 701 Receive a second management request sent by the NEF network element for managing third-party services.
  • the second management request indicates a third-party service provided by a third-party application.
  • the third-party service may be a service (such as a game service, a voice service, etc.) provided by a third-party application.
  • the third-party application may be in addition to a terminal device, a network device, and a network. Applications outside the network elements of the control plane.
  • the above-mentioned second management request may be a second registration request for registering a third-party service and/or a second deregistration request for deregistering the third-party service.
  • a second registration request for registering a third-party service
  • a second deregistration request for deregistering the third-party service.
  • Step 702 Manage the third-party service based on the second management request.
  • the NRF network element when the second management request is a second registration request, the NRF network element will register and manage the third-party service based on the second registration request. And, in another embodiment of the present disclosure, when the second management request is a second logout request, the NRF network element performs logout management on the third-party service based on the second logout request.
  • the specific registration management and deregistration management will be introduced in detail in subsequent embodiments.
  • Step 703 Return the management result to the NEF network element.
  • the management result may include a successful registration response.
  • the management result may include a logout success response.
  • the NEF network element will receive the first management request sent by the AF network element for managing the third-party service, and the first management request indicates the third-party service management method.
  • Third-party services provided by third-party applications will manage the third-party services based on the first management request and return the management results to the AF network element. That is to say, in the third-party service management method provided by this disclosure, the NEF network element can manage the third-party service.
  • the third-party service can be registered and/or deregistered, so that the NEF network element can know the third-party service.
  • the network can subsequently call the third-party services through the NEF network element, which improves the richness of network services.
  • FIG 8 is a schematic flowchart of a third-party service management method provided by an embodiment of the present disclosure. The method is executed by the NRF network element. As shown in Figure 8, the third-party service management method may include the following steps:
  • Step 801 Receive a second registration request sent by the NEF network element for registering a third-party service.
  • the second registration request may include the registration information and NEF ID of the third-party service requesting registration.
  • the above-mentioned registration information may include at least one of the following:
  • the ID of the PLMN corresponding to the third-party application is the ID of the PLMN corresponding to the third-party application.
  • the NRF network element can receive the second registration request sent by the NEF network element for registering a third-party service through Nnrf_NFManagement_NFRegister.
  • Step 802 Register and manage the third-party service based on the second registration request.
  • the above-mentioned method for registering and managing a third-party service based on the second registration request may include at least one of the following:
  • a corresponding configuration file is generated and stored for third-party service registration based on the registration information and NEF ID of the third-party service, it means that the third-party service has been registered on the NRF network. Yuan completed registration. Also, when the NRF network element sets the availability status corresponding to the third-party service to available, it can also mean that the third-party service has been registered with the NRF network element.
  • the above-mentioned method of setting the available status corresponding to the third-party service to available may include: setting an available status information for the third-party service, and setting the available status corresponding to the third-party service to The available status information is set to a first value to indicate that the third-party service is available.
  • the above-mentioned first numerical value may be 1.
  • Step 803 Return a registration success response to the NEF network element.
  • the NEF network element will receive the first management request sent by the AF network element for managing the third-party service, and the first management request indicates the third-party service management method.
  • Third-party services provided by third-party applications will manage the third-party services based on the first management request and return the management results to the AF network element. That is to say, in the third-party service management method provided by this disclosure, the NEF network element can manage the third-party service.
  • the third-party service can be registered and/or deregistered, so that the NEF network element can know the third-party service.
  • the network can subsequently call the third-party services through the NEF network element, which improves the richness of network services.
  • FIG. 9 is a schematic flowchart of a third-party service management method provided by an embodiment of the present disclosure. The method is executed by the NRF network element. As shown in Figure 9, the third-party service management method may include the following steps:
  • Step 901 Receive a second registration request sent by the NEF network element for registering a third-party service.
  • Step 902 Register and manage the third-party service based on the second registration request.
  • steps 901 to 902 please refer to the above embodiment description, and the embodiments of the present disclosure will not be described again here.
  • Step 903 Send the first notification message to the specific NF network element.
  • the specific NF network element may be a network element subscribed to a service change event, where the service change event may include a service registration event and/or a service deregistration event.
  • the specific NF network element can be specifically understood as: the NF network element that needs to be notified when a service change event (such as a service registration event and/or a service change event) occurs.
  • the first notification message is used to notify the specific NF network element that the third-party service has completed registration.
  • the first notification message may include the PLMD ID corresponding to the third-party application and the ID of the NF corresponding to the third-party service.
  • the first notification message is sent to a specific NF network element, so that the specific NF network element can know that the third-party service indicated by the first notification message has been registered, thereby The specific NF network element can subsequently request to use the third-party service.
  • the NEF network element will receive the first management request sent by the AF network element for managing the third-party service, and the first management request indicates the third-party service management method.
  • Third-party services provided by third-party applications will manage the third-party services based on the first management request and return the management results to the AF network element. That is to say, in the third-party service management method provided by this disclosure, the NEF network element can manage the third-party service.
  • the third-party service can be registered and/or deregistered, so that the NEF network element can know the third-party service.
  • the network can subsequently call the third-party services through the NEF network element, which improves the richness of network services.
  • FIG 10 is a schematic flowchart of a third-party service management method provided by an embodiment of the present disclosure. The method is executed by the NRF network element. As shown in Figure 10, the third-party service management method may include the following steps:
  • Step 1001 Receive the second logout request sent by the NEF network element for logging out of the third-party service.
  • the second logout request may include logout information of the third-party service requesting logout.
  • the above-mentioned logout information may include at least one of the following:
  • the ID of the PLMN corresponding to the third-party application is the ID of the PLMN corresponding to the third-party application.
  • the NRF network element may receive the second deregistration request sent by the NEF network element for deregistering the third-party service through Nnrf_NFManagement_NFDeregister.
  • Step 1002 Perform logout management on the third-party service based on the second logout request.
  • the above-mentioned method for logout management of a third-party service based on the second logout request may include at least one of the following:
  • the configuration file corresponding to the third-party service when the configuration file corresponding to the third-party service is deleted based on the deregistration information of the third-party service, it means that the third-party service has completed deregistration on the NRF network element. Also, when the NRF network element sets the availability status corresponding to the third-party service to unavailable, it can also mean that the third-party service has been logged out of the NRF network element.
  • the above-mentioned method of setting the available status corresponding to the third-party service to unavailable may include: setting an available status information for the third-party service, and by setting the corresponding third-party service to The available status information is set to the second value to indicate that the third-party service is in an unavailable status.
  • the above-mentioned second numerical value may be 0.
  • Step 1003 Return a successful logout response to the NEF network element.
  • the NEF network element will receive the first management request sent by the AF network element for managing the third-party service, and the first management request indicates the third-party service management method.
  • Third-party services provided by third-party applications will manage the third-party services based on the first management request and return the management results to the AF network element. That is to say, in the third-party service management method provided by this disclosure, the NEF network element can manage the third-party service.
  • the third-party service can be registered and/or deregistered, so that the NEF network element can know the third-party service.
  • the network can subsequently call the third-party services through the NEF network element, which improves the richness of network services.
  • FIG 11 is a schematic flowchart of a third-party service management method provided by an embodiment of the present disclosure. The method is executed by NRF. As shown in Figure 11, the third-party service management method may include the following steps:
  • Step 1101 Receive the second logout request sent by the NEF network element for logging out of the third-party service.
  • Step 1102 Perform logout management on the third-party service based on the second logout request.
  • Step 1103 Send the second notification message to the specific NF network element.
  • the specific NF network element may be a network element subscribed to a service change event, where the service change event may include a service registration event and/or a service deregistration event.
  • the specific NF network element can be specifically understood as: the NF network element that needs to be notified when a service change event (such as a service registration event and/or a service change event) occurs.
  • the second notification message is used to notify the specific NF network element that the third-party service has completed deregistration.
  • the second notification message may include the PLMD ID corresponding to the third-party application and the ID of the NF corresponding to the third-party service.
  • the second notification message is sent to a specific NF network element, so that the specific NF network element can know that the third-party service indicated by the second notification message has been deregistered, thereby The specific NF network element may no longer request to use the third-party service.
  • the NEF network element will receive the first management request sent by the AF network element for managing the third-party service, and the first management request indicates the third-party service management method.
  • Third-party services provided by third-party applications will manage the third-party services based on the first management request and return the management results to the AF network element. That is to say, in the third-party service management method provided by this disclosure, the NEF network element can manage the third-party service.
  • the third-party service can be registered and/or deregistered, so that the NEF network element can know the third-party service.
  • the network can subsequently call the third-party services through the NEF network element, which improves the richness of network services.
  • FIG 12 is a schematic flowchart of a third-party service management method provided by an embodiment of the present disclosure. The method is executed by the AF network element. As shown in Figure 12, the third-party service management method may include the following steps:
  • Step 1201 Send a first management request for managing third-party services to the NEF network element.
  • the first management request indicates a third-party service provided by a third-party application.
  • the third-party service may be a service (such as a game service, a voice service, etc.) provided by a third-party application.
  • the third-party application may be in addition to a terminal device, a network device, and a network. Applications outside the network elements of the control plane.
  • the above-mentioned first management request may be a first registration request for registering a third-party service and/or a first deregistration request for deregistering the third-party service. This part will be introduced in detail in subsequent embodiments.
  • Step 1202 Receive the management result returned by the NEF network element.
  • the management result may include a registration success response or a registration failure response.
  • the management result may include a logout success response or a logout failure response.
  • the NEF network element will receive the first management request sent by the AF network element for managing the third-party service, and the first management request indicates the third-party service management method.
  • Third-party services provided by third-party applications will manage the third-party services based on the first management request and return the management results to the AF network element. That is to say, in the third-party service management method provided by this disclosure, the NEF network element can manage the third-party service.
  • the third-party service can be registered and/or deregistered, so that the NEF network element can know the third-party service.
  • the network can subsequently call the third-party services through the NEF network element, which improves the richness of network services.
  • FIG 13 is a schematic flowchart of a third-party service management method provided by an embodiment of the present disclosure. The method is executed by the AF network element. As shown in Figure 13, the third-party service management method may include the following steps:
  • Step 1301 Send a first registration request for registering a third-party service to the NEF network element.
  • the first registration request may include registration information of a third-party service.
  • the above-mentioned registration information may include at least one of the following:
  • the ID of the PLMN corresponding to the third-party application is the ID of the PLMN corresponding to the third-party application.
  • Step 1302 Receive the registration success response returned by the NEF network element.
  • the registration success response is used to indicate that the third-party service has been successfully registered.
  • the network device can subsequently call the third-party service.
  • the network device can subsequently call the AF network element.
  • the NEF network element will receive the first management request sent by the AF network element for managing the third-party service, and the first management request indicates the third-party service management method.
  • Third-party services provided by third-party applications will manage the third-party services based on the first management request and return the management results to the AF network element. That is to say, in the third-party service management method provided by this disclosure, the NEF network element can manage the third-party service.
  • the third-party service can be registered and/or deregistered, so that the NEF network element can know the third-party service.
  • the network can subsequently call the third-party services through the NEF network element, which improves the richness of network services.
  • FIG 14 is a schematic flowchart of a third-party service management method provided by an embodiment of the present disclosure. The method is executed by the AF network element. As shown in Figure 14, the third-party service management method may include the following steps:
  • Step 1401 Send a first registration request for registering a third-party service to the NEF network element.
  • Step 1402 Receive the registration failure response returned by the NEF network element.
  • the registration failure response is used to indicate that the third-party service has not been successfully registered. At this time, the network device cannot call the third-party service.
  • the NEF network element will receive the first management request sent by the AF network element for managing the third-party service, and the first management request indicates the third-party service management method.
  • Third-party services provided by third-party applications will manage the third-party services based on the first management request and return the management results to the AF network element. That is to say, in the third-party service management method provided by this disclosure, the NEF network element can manage the third-party service.
  • the third-party service can be registered and/or deregistered, so that the NEF network element can know the third-party service.
  • the network can subsequently call the third-party services through the NEF network element, which improves the richness of network services.
  • FIG. 15 is a schematic flowchart of a third-party service management method provided by an embodiment of the present disclosure. The method is executed by the AF network element. As shown in Figure 15, the third-party service management method may include the following steps:
  • Step 1501 Send a first deregistration request for registering a third-party service to the NEF network element.
  • the first logout request includes logout information of the third-party service.
  • the logout information may include at least one of the following:
  • the ID of the PLMN corresponding to the third-party application is the ID of the PLMN corresponding to the third-party application.
  • Step 1502 Receive a successful logout response returned by the NEF network element.
  • the registration success response is used to indicate that the third-party service has been successfully deregistered. At this time, the network device can no longer call the third-party service.
  • the NEF network element will receive the first management request sent by the AF network element for managing the third-party service, and the first management request indicates the third-party service management method.
  • Third-party services provided by third-party applications will manage the third-party services based on the first management request and return the management results to the AF network element. That is to say, in the third-party service management method provided by this disclosure, the NEF network element can manage the third-party service.
  • the third-party service can be registered and/or deregistered, so that the NEF network element can know the third-party service.
  • the network can subsequently call the third-party services through the NEF network element, which improves the richness of network services.
  • FIG 16 is a schematic flowchart of a third-party service management method provided by an embodiment of the present disclosure. The method is executed by the AF network element. As shown in Figure 16, the third-party service management method may include the following steps:
  • Step 1601 Send a first deregistration request for registering a third-party service to the NEF network element.
  • Step 1602 Receive the logout failure response returned by the NEF network element.
  • the AF network element when the AF network element receives a logout failure response returned by the NEF network element, it indicates that the third-party service has failed to log out.
  • the NEF network element will receive the first management request sent by the AF network element for managing the third-party service, and the first management request indicates the third-party service management method.
  • Third-party services provided by third-party applications will manage the third-party services based on the first management request and return the management results to the AF network element. That is to say, in the third-party service management method provided by this disclosure, the NEF network element can manage the third-party service.
  • the third-party service can be registered and/or deregistered, so that the NEF network element can know the third-party service.
  • the network can subsequently call the third-party services through the NEF network element, which improves the richness of network services.
  • Figure 17 is an interactive method for third-party service registration provided by an embodiment of the present disclosure.
  • the interactive method may include the following steps:
  • Step 1701 The AF network element sends a new third-party service registration request (ie, the first registration request in the above embodiment) to the NEF network element to perform the service registration process in the core network.
  • a new third-party service registration request ie, the first registration request in the above embodiment
  • Step 1702 The NEF network element authorizes the registration request of the AF network element. If the NEF network element is authorized successfully, the NEF network element stores the ID of the NF corresponding to the third-party service and performs steps 1704 to 1705; if the authorization fails, perform steps 1703.
  • Step 1703 Return a Result value (False) (ie, the registration failure response in the above embodiment) to the AF network element, indicating that the authorization fails, and the process ends.
  • Step 1704 The NEF network element sends the registration information and NEF ID of the third-party service to the NRF network element through Nnrf_NFManagement_NFRegister (for example, it is carried in the above-mentioned second registration request and sent to the NRF network element).
  • Step 1705 The NRF network element generates a corresponding configuration file for third-party service registration based on the registration information and NEF ID of the third-party service, sets the corresponding available status of the third-party service to available, and notifies all others who have subscribed to the service change event
  • the NF network element sends a first notification message to all other NF network elements (this step is not shown in Figure 17), and the NRF network element returns a registration success response to the AF network element through the NEF network element.
  • Figure 18 is an interactive method for third-party service logout provided by an embodiment of the present disclosure.
  • the interactive method may include the following steps:
  • Step 1801 The AF network element sends a deregistration request for the third-party service to the NEF network element (ie, the first deregistration request in the above embodiment) to perform the service registration process in the core network.
  • the NEF network element ie, the first deregistration request in the above embodiment
  • Step 1802 The NEF network element searches whether the NF ID has been successfully registered based on the ID of the NF received in the deregistration request. If the ID of the NF is not found, the third-party service has not been successfully registered, and then performs step 1803; if the search If the ID of the NF is found, the third-party service has been successfully registered, and steps 1804 to 1805 are executed.
  • Step 1803 Return a Result value (False) (that is, the logout failure response in the above embodiment) to the AF network element, indicating that the logout has failed, and the process ends.
  • Step 1804 The NEF network element sends the deregistration information of the third-party service to the NRF network element through Nnrf_NFManagement_NFDeregister (for example, it is carried in the above-mentioned second deregistration request and sent to the NRF network element).
  • Step 1805 The NRF network element deletes the configuration file corresponding to the third-party service based on the logout information corresponding to the third-party service, sets the available status of the third-party service to unavailable, and notifies all other NFs that have subscribed to the service change event. All NF network elements send a second notification message (this step is not shown in Figure 18), and the NRF network element returns a deregistration success response to the AF through the NEF network element.
  • the methods provided by the embodiments of the present application are introduced from the perspectives of network equipment and UE respectively.
  • the network device and the UE may include a hardware structure and a software module to implement the above functions in the form of a hardware structure, a software module, or a hardware structure plus a software module.
  • a certain function among the above functions can be executed by a hardware structure, a software module, or a hardware structure plus a software module.
  • Figure 19 is a schematic structural diagram of a communication device provided by an embodiment of the present disclosure. As shown in Figure 19, the device may include:
  • the transceiver module 1901 is configured to receive a first management request for managing third-party services sent by the application function AF network element, where the first management request indicates third-party services provided by a third-party application;
  • Management module 1902 used to manage third-party services based on the first management request
  • the transceiver module 1901 is also used to return management results to the AF network element.
  • the NEF network element will receive the first management request sent by the AF network element for managing third-party services.
  • the first management request indicates that there is a third-party application.
  • the third-party service provided by the NEF network element will then manage the third-party service based on the first management request and return the management result to the AF network element. That is to say, in the third-party service management method provided by this disclosure, the NEF network element can manage the third-party service.
  • the third-party service can be registered and/or deregistered, so that the NEF network element can know the third-party service.
  • the network can subsequently call the third-party services through the NEF network element, which improves the richness of network services.
  • the above-mentioned transceiver module 1901 is also used to:
  • Registration information includes at least one of the following:
  • the ID of the PLMN corresponding to the third-party application is the ID of the PLMN corresponding to the third-party application.
  • the above-mentioned management module 1902 is also used to:
  • the second registration request includes registration information and NEF ID;
  • the above-mentioned transceiver module 1901 is also used to:
  • the above-mentioned management module 1902 is also used to:
  • the above-mentioned transceiver module 1901 is also used to:
  • transceiver module 1901 is also used for:
  • the logout information includes at least one of the following:
  • the ID of the PLMN corresponding to the third-party application is the ID of the PLMN corresponding to the third-party application.
  • the above-mentioned management module 1902 is also used to:
  • the above-mentioned transceiver module 1901 is also used to:
  • the transceiver module 1901 is also used to:
  • the transceiver module 1901 is also used to:
  • Figure 20 is a schematic structural diagram of a communication device provided by an embodiment of the present disclosure. As shown in Figure 20, the device may include:
  • the transceiver module 2001 is configured to receive a second management request sent by the NEF network element for managing third-party services, where the second management request indicates third-party services provided by a third-party application;
  • Management module 2001 configured to manage the third-party service based on the second management request
  • the transceiver module 2001 is also used to return management results to the NEF network element.
  • the NEF network element will receive the first management request sent by the AF network element for managing third-party services.
  • the first management request indicates that there is a third-party application.
  • the third-party service provided by the NEF network element will then manage the third-party service based on the first management request and return the management result to the AF network element. That is to say, in the third-party service management method provided by this disclosure, the NEF network element can manage the third-party service.
  • the third-party service can be registered and/or deregistered, so that the NEF network element can know the third-party service.
  • the network can subsequently call the third-party services through the NEF network element, which improves the richness of network services.
  • the above-mentioned transceiver module 2001 is also used to:
  • the registration information includes at least one of the following:
  • the ID of the PLMN corresponding to the third-party application is the ID of the PLMN corresponding to the third-party application.
  • the management module 2002 is also used to:
  • the above-mentioned transceiver module 2001 is also used to:
  • the device is also used for:
  • the specific NF network element is a network element that has subscribed to a service change event, and the first notification message is used to indicate that the third-party service has completed registration.
  • the above-mentioned transceiver module 2001 is also used to:
  • the logout information includes at least one of the following:
  • the ID of the PLMN corresponding to the third-party application is the ID of the PLMN corresponding to the third-party application.
  • the above-mentioned management module 2002 is also used to:
  • the above-mentioned transceiver module 2001 is also used to:
  • the NEF network element returns a logout success response.
  • the device is also used for:
  • the specific NF network element is a network element that has subscribed to a service change event, and the second notification message is used to indicate that the third-party service has completed deregistration.
  • Figure 21a is a schematic structural diagram of a communication device provided by an embodiment of the present disclosure. As shown in Figure 21a, the device may include:
  • the transceiver module 2101a is configured to send a first management request for managing third-party services to the NEF network element, where the first management request indicates third-party services provided by a third-party application;
  • the transceiver module 2101a is also used to receive the management result returned by the NEF network element.
  • the NEF network element will receive the first management request sent by the AF network element for managing third-party services.
  • the first management request indicates that there is a third-party application.
  • the third-party service provided by the NEF network element will then manage the third-party service based on the first management request and return the management result to the AF network element. That is to say, in the third-party service management method provided by this disclosure, the NEF network element can manage the third-party service.
  • the third-party service can be registered and/or deregistered, so that the NEF network element can know the third-party service.
  • the network can subsequently call the third-party services through the NEF network element, which improves the richness of network services.
  • the above-mentioned transceiver module 2101a is also used to:
  • the registration information includes at least one of the following:
  • the ID of the PLMN corresponding to the third-party application is the ID of the PLMN corresponding to the third-party application.
  • the above-mentioned transceiver module 2101a is also used to:
  • the above-mentioned transceiver module 2101a is also used to:
  • the above-mentioned transceiver module 2101a is also used to:
  • the logout information includes at least one of the following:
  • the ID of the PLMN corresponding to the third-party application is the ID of the PLMN corresponding to the third-party application.
  • the above-mentioned transceiver module 2101a is also used to:
  • the above-mentioned transceiver module 2101a is also used to:
  • Figure 21b is a schematic structural diagram of a communication system provided by an embodiment of the present disclosure. As shown in Figure 21b, the system may include:
  • the first network element ie, the AF network element in the above embodiment
  • the first network element 2101b is used to send a first management request for managing third-party services, where the first management request indicates third-party services provided by third-party applications;
  • the second network element ie, the NEF network element in the above embodiment
  • the second network element 2102b is configured to receive the first management request for managing third-party services and manage the third-party services based on the first management request;
  • the second network element 2102b is also configured to send a second management request for managing third-party services, where the second management request indicates third-party services provided by third-party applications;
  • the third network element ie, the NRF network element in the above embodiment
  • the third network element 2103b is configured to receive a second management request for managing third-party services, manage the third-party services based on the second management request, and then send the request to the second network Yuan returns management results;
  • the second network element 2102b is also used to return the management result to the first network element
  • the first network element 2101b is also used to receive the management result returned by the second network element.
  • the above-mentioned first network element, second network element, and third network element can communicate with each other.
  • the NEF network element will receive the first management request sent by the AF network element for managing third-party services.
  • the first management request indicates that there is a third-party application.
  • the third-party service provided by the NEF network element will then manage the third-party service based on the first management request and return the management result to the AF network element. That is to say, in the third-party service management method provided by this disclosure, the NEF network element can manage the third-party service.
  • the third-party service can be registered and/or deregistered, so that the NEF network element can know the third-party service.
  • the network can subsequently call the third-party services through the NEF network element, which improves the richness of network services.
  • the above communication system can be used to register third-party services, specifically:
  • the first network element is used to send a first registration request for registering a third-party service, where the first registration request indicates a third-party service provided by a third-party application;
  • the second network element is configured to receive a first registration request for registering a third-party service and to register and manage the third-party service based on the first registration request;
  • the second network element is also used to send a second registration request for registering a third-party service, where the second registration request indicates a third-party service provided by a third-party application;
  • the third network element is configured to receive a second registration request for registering a third-party service, perform registration management on the third-party service based on the second registration request, and then return a registration success response to the second network element;
  • the second network element is also used to return a registration success response or a registration failure response to the first network element
  • the first network element is also used to receive a registration success response or a registration failure response returned by the second network element.
  • the above communication system can be used to log out of third-party services, specifically:
  • the first network element is configured to send a first logout request for logging out of a third-party service, where the first logout request indicates a third-party service provided by a third-party application;
  • the second network element is configured to receive the first deregistration request for deregistering the third-party service and perform deregistration management of the third-party service based on the first deregistration request;
  • the second network element is also configured to send a second logout request for logging out of a third-party service, where the second logout request indicates a third-party service provided by a third-party application;
  • the third network element is configured to receive a second logout request for logging out of the third-party service, perform logout management on the third-party service based on the second logout request, and then return a logout success response to the second network element;
  • the second network element is also used to return a logout success response or a logout failure response to the first network element
  • the first network element is also configured to receive a successful logout response or a failed logout response returned by the second network element.
  • the above-mentioned second network element 2102b is also used for:
  • the registration information includes at least one of the following:
  • the ID of the public land mobile network PLMN corresponding to the third-party application is the ID of the public land mobile network PLMN corresponding to the third-party application.
  • the above-mentioned second network element 2102b is also used for:
  • the above-mentioned second network element 2102b is also used for:
  • the above-mentioned second network element 2102b is also used for:
  • the above-mentioned second network element 2102b is also used for:
  • the above-mentioned second network element 2102b is also used for:
  • the logout information includes at least one of the following:
  • the ID of the PLMN corresponding to the third-party application is the ID of the PLMN corresponding to the third-party application.
  • the above-mentioned second network element 2102b is also used for:
  • the above-mentioned second network element 2102b is also used for:
  • the above-mentioned second network element 2102b is also used for:
  • the above-mentioned second network element 2102b is also used for:
  • the above-mentioned third network element 2103b is also used for:
  • the registration information includes at least one of the following:
  • the ID of the PLMN corresponding to the third-party application is the ID of the PLMN corresponding to the third-party application.
  • the above-mentioned third network element 2103b is also used for:
  • the above-mentioned third network element 2103b is also used for:
  • the above-mentioned third network element 2103b is also used for:
  • the specific NF network element is a network element that has subscribed to a service change event, and the first notification message is used to indicate that the third-party service has completed registration.
  • the above-mentioned third network element 2103b is also used for:
  • the logout information includes at least one of the following:
  • the ID of the PLMN corresponding to the third-party application is the ID of the PLMN corresponding to the third-party application.
  • the above-mentioned third network element 2103b is also used for:
  • the above-mentioned third network element 2103b is also used for:
  • the above-mentioned third network element 2103b is also used for:
  • the specific NF network element is a network element that has subscribed to a service change event, and the second notification message is used to indicate that the third-party service has completed deregistration.
  • the above-mentioned first network element 2101b is also used for:
  • the registration information includes at least one of the following:
  • the ID of the PLMN corresponding to the third-party application is the ID of the PLMN corresponding to the third-party application.
  • the above-mentioned first network element 2101b is also used for:
  • the above-mentioned first network element 2101b is also used for:
  • the above-mentioned first network element 2101b is also used for:
  • the logout information includes at least one of the following:
  • the ID of the PLMN corresponding to the third-party application is the ID of the PLMN corresponding to the third-party application.
  • the above-mentioned first network element 2101b is also used for:
  • the above-mentioned first network element 2101b is also used for:
  • FIG 22 is a schematic structural diagram of a communication device 2200 provided by an embodiment of the present application.
  • the communication device 2200 may be a network device, a terminal device, a chip, a chip system, or a processor that supports a network device to implement the above method, or a chip, a chip system, or a processor that supports a terminal device to implement the above method. Processor etc.
  • the device can be used to implement the method described in the above method embodiment. For details, please refer to the description in the above method embodiment.
  • Communication device 2200 may include one or more processors 2201.
  • the processor 2201 may be a general-purpose processor or a special-purpose processor, or the like.
  • it can be a baseband processor or a central processing unit.
  • the baseband processor can be used to process communication protocols and communication data.
  • the central processor can be used to control communication devices (such as base stations, baseband chips, terminal equipment, terminal equipment chips, DU or CU, etc.) and execute computer programs. , processing data for computer programs.
  • the communication device 2200 may also include one or more memories 2202, on which a computer program 2204 may be stored.
  • the processor 2201 executes the computer program 2204, so that the communication device 2200 performs the steps described in the above method embodiments. method.
  • the memory 2202 may also store data.
  • the communication device 2200 and the memory 2202 can be provided separately or integrated together.
  • the communication device 2200 may also include a transceiver 2205 and an antenna 2206.
  • the transceiver 2205 may be called a transceiver unit, a transceiver, a transceiver circuit, etc., and is used to implement transceiver functions.
  • the transceiver 2205 may include a receiver and a transmitter.
  • the receiver may be called a receiver or a receiving circuit, etc., used to implement the receiving function;
  • the transmitter may be called a transmitter, a transmitting circuit, etc., used to implement the transmitting function.
  • the communication device 2200 may also include one or more interface circuits 2207.
  • the interface circuit 2207 is used to receive code instructions and transmit them to the processor 2201.
  • the processor 2201 executes the code instructions to cause the communication device 2200 to perform the method described in the above method embodiment.
  • the communication device 2200 is an NEF network element: the transceiver 2205 is used to perform step 201 and step 203 in Figure 2; step 301, step 304 to step 306 in Figure 3; step 401 and step 404 in Figure 4; Figure 5 Step 501, step 503 to step 505; step 601 and step 604 in Figure 6.
  • the processor 2201 is used to execute step 202 in Figure 2; steps 302 to step 303 in Figure 3; step 402 to step 403 in Figure 4; step 502 in Figure 5; and step 602 to step 603 in Figure 6.
  • the communication device 2200 is an NRF network element: the transceiver 2205 is used to perform steps 701 and 703 in Figure 7; steps 801 and 803 in Figure 8; steps 901 and 903 in Figure 9; and step 1001 in Figure 10 , step 1003; step 1101, step 1103 in Figure 11.
  • the processor 2201 is used to execute step 702 in Figure 7; step 802 in Figure 8; step 902 in Figure 9; step 1002 in Figure 10; and step 1102 in Figure 11.
  • the communication device 2200 is an AF network element: the transceiver 2205 is used to perform steps 1201 to 1202 in Figure 12; steps 1301 to 1302 in Figure 13; steps 1401 to 1402 in Figure 14; step 1501 in Figure 15 Go to step 1502; step 1601 to step 1602 in Figure 16.
  • the processor 2201 is used to execute step 504 in FIG. 5 .
  • the processor 2201 may include a transceiver for implementing receiving and transmitting functions.
  • the transceiver may be a transceiver circuit, an interface, or an interface circuit.
  • the transceiver circuits, interfaces or interface circuits used to implement the receiving and transmitting functions can be separate or integrated together.
  • the above-mentioned transceiver circuit, interface or interface circuit can be used for reading and writing codes/data, or the above-mentioned transceiver circuit, interface or interface circuit can be used for signal transmission or transfer.
  • the processor 2201 may store a computer program 2203, and the computer program 2203 runs on the processor 2201, causing the communication device 2200 to perform the method described in the above method embodiment.
  • the computer program 2203 may be solidified in the processor 2201, in which case the processor 2201 may be implemented by hardware.
  • the communication device 2200 may include a circuit, and the circuit may implement the functions of sending or receiving or communicating in the foregoing method embodiments.
  • the processor and transceiver described in this application can be implemented in integrated circuits (ICs), analog ICs, radio frequency integrated circuits RFICs, mixed signal ICs, application specific integrated circuits (ASICs), printed circuit boards ( printed circuit board (PCB), electronic equipment, etc.
  • the processor and transceiver can also be manufactured using various IC process technologies, such as complementary metal oxide semiconductor (CMOS), n-type metal oxide-semiconductor (NMOS), P-type Metal oxide semiconductor (positive channel metal oxide semiconductor, PMOS), bipolar junction transistor (BJT), bipolar CMOS (BiCMOS), silicon germanium (SiGe), gallium arsenide (GaAs), etc.
  • CMOS complementary metal oxide semiconductor
  • NMOS n-type metal oxide-semiconductor
  • PMOS P-type Metal oxide semiconductor
  • BJT bipolar junction transistor
  • BiCMOS bipolar CMOS
  • SiGe silicon germanium
  • GaAs gallium arsenide
  • the communication device described in the above embodiments may be a network device or a terminal device, but the scope of the communication device described in this application is not limited thereto, and the structure of the communication device may not be limited by FIG. 22 .
  • the communication device may be a stand-alone device or may be part of a larger device.
  • the communication device may be:
  • the IC collection may also include storage components for storing data and computer programs;
  • the communication device may be a chip or a chip system
  • the schematic structural diagram of the chip shown in FIG. 23 refer to the schematic structural diagram of the chip shown in FIG. 23 .
  • the chip shown in Figure 23 includes a processor 2301 and an interface 2302.
  • the number of processors 2301 may be one or more, and the number of interfaces 2302 may be multiple.
  • the chip also includes a memory 2303, which is used to store necessary computer programs and data.
  • This application also provides a readable storage medium on which instructions are stored. When the instructions are executed by a computer, the functions of any of the above method embodiments are implemented.
  • This application also provides a computer program product, which, when executed by a computer, implements the functions of any of the above method embodiments.
  • the computer program product includes one or more computer programs.
  • the computer may be a general purpose computer, a special purpose computer, a computer network, or other programmable device.
  • the computer program may be stored in or transferred from one computer-readable storage medium to another, for example, the computer program may be transferred from a website, computer, server, or data center Transmission to another website, computer, server or data center through wired (such as coaxial cable, optical fiber, digital subscriber line (DSL)) or wireless (such as infrared, wireless, microwave, etc.) means.
  • the computer-readable storage medium may be any available medium that can be accessed by a computer or a data storage device such as a server, data center, etc. that contains one or more available media integrated therein.
  • the available media may be magnetic media (e.g., floppy disks, hard disks, magnetic tapes), optical media (e.g., high-density digital video discs (DVD)), or semiconductor media (e.g., solid state disks, SSD)) etc.
  • magnetic media e.g., floppy disks, hard disks, magnetic tapes
  • optical media e.g., high-density digital video discs (DVD)
  • DVD digital video discs
  • semiconductor media e.g., solid state disks, SSD
  • At least one in this application can also be described as one or more, and the plurality can be two, three, four or more, which is not limited by this application.
  • the technical feature is distinguished by “first”, “second”, “third”, “A”, “B”, “C” and “D”, etc.
  • the technical features described in “first”, “second”, “third”, “A”, “B”, “C” and “D” are in no particular order or order.
  • the corresponding relationships shown in each table in this application can be configured or predefined.
  • the values of the information in each table are only examples and can be configured as other values, which are not limited by this application.
  • the corresponding relationships shown in some rows may not be configured.
  • appropriate deformation adjustments can be made based on the above table, such as splitting, merging, etc.
  • the names of the parameters shown in the titles of the above tables may also be other names understandable by the communication device, and the values or expressions of the parameters may also be other values or expressions understandable by the communication device.
  • other data structures can also be used, such as arrays, queues, containers, stacks, linear lists, pointers, linked lists, trees, graphs, structures, classes, heaps, hash tables or hash tables. wait.
  • Predefinition in this application can be understood as definition, pre-definition, storage, pre-storage, pre-negotiation, pre-configuration, solidification, or pre-burning.

Abstract

本公开提出一种第三方服务管理方法/装置/设备/存储介质,属于通信技术领域。NEF网元接收AF网元发送的用于管理第三方服务的第一管理请求,第一管理请求中指示有第三方应用所提供的第三方服务,之后,NEF网元会基于第一管理请求对第三方服务进行管理,并向AF网元返回管理结果。由此可知,本公开提供了一种第三方服务管理方法,可以用于对第三方服务进行管理,从而使得NRF网元知道第三方服务提供的服务,进而使得NRF网元发现并利用第三方服务为NF网元提供服务。

Description

一种第三方服务管理方法/装置/设备及存储介质 技术领域
本公开涉及通信技术领域,尤其涉及一种第三方服务管理方法/装置/设备及存储介质。
背景技术
在未来网络系统中,会引入多种新的服务(如AI服务、感知服务等),来提高网络服务的丰富性。该新的服务可能由网络内的节点提供的,也可能由网络外的第三方提供。其中,当该新的服务由第三方提供时,目前还不存在一种网络对第三方提供的服务的管理调用方法。
发明内容
本公开提出的第三方服务管理方法/装置/设备及存储介质,用于对第三方应用提供的第三方服务进行管理。
第一方面,本公开实施例提供一种第三方服务管理方法,该方法由NEF网元执行,包括:
接收应用功能AF网元发送的用于管理第三方服务的第一管理请求,所述第一管理请求中指示有第三方应用所提供的第三方服务;
基于所述第一管理请求对所述第三方服务进行管理;
向所述AF网元返回管理结果。
本公开提供的第三方服务管理方法中,NEF网元可以对第三方服务进行管理,如具体可以对第三方服务进行注册和/或注销管理,由此NEF网元能够知晓第三方应用具体可以提供哪些第三方服务,则网络后续可以通过NEF网元调用该第三方服务,提高了网络服务的丰富性。
第二方面,本公开实施例提供一种第三方服务管理方法,该方法由NRF网元执行,包括:
接收NEF网元发送的用于管理第三方服务的第二管理请求,所述第二管理请求中指示有第三方应用所提供的第三方服务;
基于所述第二管理请求对所述第三方服务进行管理;
向所述NEF网元返回管理结果。
第三方面,本公开实施例提供一种第三方服务管理方法,该方法由AF网元执行,包括:
向NEF网元发送用于管理第三方服务的第一管理请求,所述第一管理请求中指示有第三方应用所提供的第三方服务;
接收所述NEF网元返回的管理结果。
第四方面,本公开实施例提供一种通信装置,该装置被配置在NEF网元中,包括:
收发模块,用于接收应用功能AF网元发送的用于管理第三方服务的第一管理请求,所述第一管理请求中指示有第三方应用所提供的第三方服务;
管理模块,用于基于所述第一管理请求对所述第三方服务进行管理;
所述收发模块,还用于向所述AF网元返回管理结果。
第五方面,本公开实施例提供一种通信装置,该装置被配置在NRF网元中,包括:
收发模块,用于接收NEF网元发送的用于管理第三方服务的第二管理请求,所述第二管理请求中指示有第三方应用所提供的第三方服务;
管理模块,用于基于所述第二管理请求对所述第三方服务进行管理;
所述收发模块,还用于向所述NEF网元返回管理结果。
第六方面,本公开实施例提供一种通信装置,该装置被配置在AF网元中,包括
收发模块,用于向NEF网元发送用于管理第三方服务的第一管理请求,所述第一管理请求中指示有第三方应用所提供的第三方服务;
所述收发模块,还用于接收所述NEF网元返回的管理结果。
第七方面,本公开实施例提供一种通信系统,该系统包括:
第一网元,用于发送用于管理第三方服务的第一管理请求,所述第一管理请求中指示有第三方应用所提供的第三方服务;
第二网元,用于接收所述用于管理第三方服务的第一管理请求并基于所述第一管理请求对所述第三方服务进行管理;
所述第二网元,还用于发送用于管理第三方服务的第二管理请求,所述第二管理请求中指示有第三方应用所提供的第三方服务;
第三网元,用于接收所述用于管理第三方服务的第二管理请求,并基于所述第二管理请求对所述第三方服务进行管理,再向所述第二网元返回管理结果;
所述第二网元,还用于向所述第一网元返回管理结果;
所述第一网元,还用于接收所述第二网元返回的管理结果。
第八方面,本公开实施例提供一种通信装置,该通信装置包括处理器,当该处理器调用存储器中的计算机程序时,执行上述第一方面所述的方法。
第九方面,本公开实施例提供一种通信装置,该通信装置包括处理器,当该处理器调用存储器中的计算机程序时,执行上述第二方面所述的方法。
第十方面,本公开实施例提供一种通信装置,该通信装置包括处理器,当该处理器调用存储器中的计算机程序时,执行上述第三方面所述的方法。
第十一方面,本公开实施例提供一种通信装置,该通信装置包括处理器和存储器,该存储器中存储有计算机程序;所述处理器执行该存储器所存储的计算机程序,以使该通信装置执行上述第一方面所述的方法。
第十二方面,本公开实施例提供一种通信装置,该通信装置包括处理器和存储器,该存储器中存储有计算机程序;所述处理器执行该存储器所存储的计算机程序,以使该通信装置执行上述第二方面所述的方法。
第十三方面,本公开实施例提供一种通信装置,该通信装置包括处理器和存储器,该存储器中存储有计算机程序;所述处理器执行该存储器所存储的计算机程序,以使该通信装置执行上述第三方面所述的方法。
第十四方面,本公开实施例提供一种通信装置,该装置包括处理器和接口电路,该接口电路用于接收代码指令并传输至该处理器,该处理器用于运行所述代码指令以使该装置执行上述第一方面所述的方法。
第十五方面,本公开实施例提供一种通信装置,该装置包括处理器和接口电路,该接口电路用于接收代码指令并传输至该处理器,该处理器用于运行所述代码指令以使该装置执行上述第二方面所述的方法。
第十六方面,本公开实施例提供一种通信装置,该装置包括处理器和接口电路,该接口电路用于接收代码指令并传输至该处理器,该处理器用于运行所述代码指令以使该装置执行上述第三方面所述的方法。
第十七方面,本公开实施例提供一种通信系统,该系统包括第四方面所述的通信装置至第六方面所述的通信装置,或者,该系统包括第八方面所述的通信装置至第十方面所述的通信装置,或者,该系统包括第十一方面所述的通信装置至第十三方面所述的通信装置,或者,该系统包括第十四方面所述的通信装置至第十六方面所述的通信装置。
第十八方面,本发明实施例提供一种计算机可读存储介质,用于储存为上述网络设备所用的指令,当所述指令被执行时,使所述终端设备执行上述第一方面至第三方面的任一方面所述的方法。
第十九方面,本公开还提供一种包括计算机程序的计算机程序产品,当其在计算机上运行时,使得计算机执行上述第一方面至第三方面的任一方面所述的方法。
第二十方面,本公开提供一种芯片系统,该芯片系统包括至少一个处理器和接口,用于支持网络设备实现第一方面至第三方面的任一方面所述的方法所涉及的功能,例如,确定或处理上述方法中所涉及 的数据和信息中的至少一种。在一种可能的设计中,所述芯片系统还包括存储器,所述存储器,用于保存源辅节点必要的计算机程序和数据。该芯片系统,可以由芯片构成,也可以包括芯片和其他分立器件。
第二十一方面,本公开提供一种计算机程序,当其在计算机上运行时,使得计算机执行上述第一方面至第三方面的任一方面所述的方法。
附图说明
本公开上述的和/或附加的方面和优点从下面结合附图对实施例的描述中将变得明显和容易理解,其中:
图1为本公开实施例提供的一种通信系统的架构示意图;
图2为本公开另一个实施例所提供的第三方服务管理方法的流程示意图;
图3为本公开再一个实施例所提供的第三方服务管理方法的流程示意图;
图4为本公开又一个实施例所提供的第三方服务管理方法的流程示意图;
图5为本公开另一个实施例所提供的第三方服务管理方法的流程示意图;
图6为本公开再一个实施例所提供的第三方服务管理方法的流程示意图;
图7为本公开又一个实施例所提供的第三方服务管理方法的流程示意图;
图8为本公开一个实施例所提供的第三方服务管理方法的流程示意图;
图9为本公开另一个实施例所提供的第三方服务管理方法的流程示意图;
图10为本公开再一个实施例所提供的第三方服务管理方法的流程示意图;
图11为本公开又一个实施例所提供的第三方服务管理方法的流程示意图;
图12为本公开另一个实施例所提供的第三方服务管理方法的流程示意图;
图13为本公开再一个实施例所提供的第三方服务管理方法的流程示意图;
图14为本公开又一个实施例所提供的第三方服务管理方法的流程示意图;
图15为本公开再一个实施例所提供的第三方服务管理方法的流程示意图;
图16为本公开又一个实施例所提供的第三方服务管理方法的流程示意图;
图17为本公开另一个实施例所提供的第三方服务注册的交互方法的流程示意图;
图18为本公开再一个实施例所提供的第三方服务注销的交互方法的流程示意图;
图19为本公开一个实施例所提供的通信装置的结构示意图;
图20为本公开另一个实施例所提供的通信装置的结构示意图;
图21a为本公开一个实施例所提供的通信装置的结构示意图;
图21b为本公开一个实施例所提供的通信系统的结构示意图;
图22是本公开一个实施例所提供的一种用户设备的框图;
图23为本公开一个实施例所提供的一种网络侧设备的框图。
具体实施方式
这里将详细地对示例性实施例进行说明,其示例表示在附图中。下面的描述涉及附图时,除非另有表示,不同附图中的相同数字表示相同或相似的要素。以下示例性实施例中所描述的实施方式并不代表与本公开实施例相一致的所有实施方式。相反,它们仅是与如所附权利要求书中所详述的、本公开实施例的一些方面相一致的装置和方法的例子。
在本公开实施例使用的术语是仅仅出于描述特定实施例的目的,而非旨在限制本公开实施例。在本公开实施例和所附权利要求书中所使用的单数形式的“一种”和“该”也旨在包括多数形式,除非上下文清楚地表示其他含义。还应当理解,本文中使用的术语“和/或”是指并包含一个或多个相关联的列出项目的任何或所有可能组合。
应当理解,尽管在本公开实施例可能采用术语第一、第二、第三等来描述各种信息,但这些信息不应限于这些术语。这些术语仅用来将同一类型的信息彼此区分开。例如,在不脱离本公开实施例范围的情况下,第一信息也可以被称为第二信息,类似地,第二信息也可以被称为第一信息。取决于语境,如 在此所使用的词语“如果”及“若”可以被解释成为“在……时”或“当……时”或“响应于确定”。
下面详细描述本公开的实施例,所述实施例的示例在附图中示出,其中自始至终相同或类似的标号表示相同或类似的要素。下面通过参考附图描述的实施例是示例性的,旨在用于解释本公开,而不能理解为对本公开的限制。
为了便于理解,首先介绍本申请涉及的术语。
1、人工智能(Artificial Intelligence,AI)
AI是研究、开发用于模拟、延伸和扩展人的智能的理论、方法、技术及应用系统的一门新的技术科学。
2、网络存储功能(Network Repository Function,NRF)网元
NRF网元,存储并维护网络中的NF信息,并提供NF发现/选择/订阅功能,即可以向NRF请求某个NF的信息,如IP地址。
3、网络开放功能(Network Exposure Function,NEF)网元
NEF网元,安全地将网络中其它NF提供的服务开放给第三方、AF等,以及安全地将AF发送的信息传到网络,起到服务层安全网关作用。
4、应用功能(Application Function,AF)网元
AF网元,提供应用的网元,授权服务器可以作为AF部署。
本公开实施例中涉及到的各种网元/功能,其既可以是一个独立的硬件设备,也可以是在硬件设备内的通过计算机代码实现的功能,本公开实施例中并不对此做出限定。
为了更好的理解本公开实施例公开的一种确定传输配置指示状态的方法,下面首先对本公开实施例适用的通信系统进行描述。
5G服务化网络架构是将网元的功能抽象成多个服务。其中,相对于传统网络架构而言,5G服务化架构中新增了NEF网元和NRF网元两个网元,NEF可以安全地对外提供3GPP网元服务和能力,可以看成是一个安全网关,外界要调用内部网络的功能要通过NEF中转,防止内部网元直接暴露带来安全问题,这里的外界可以是运营商网络的第三方、AF、边缘计算网元等。
请参见图1,图1为本公开实施例提供的一种5G服务化网络架构的示意图。图1中包括5G服务化网络架构包括的网元以及各个网元之间用于通信的接口。
可以理解的是,本公开实施例描述的通信系统是为了更加清楚的说明本公开实施例的技术方案,并不构成对于本公开实施例提供的技术方案的限定,本领域普通技术人员可知,随着系统架构的演变和新业务场景的出现,本公开实施例提供的技术方案对于类似的技术问题,同样适用。
下面参考附图对本公开实施例所提供的第三方服务管理方法/装置/设备及存储介质进行详细描述。
图2为本公开实施例所提供的一种第三方服务管理方法的流程示意图,该方法由NEF网元执行,如图2所示,该第三方服务管理方法可以包括以下步骤:
步骤201、接收AF(Application Function,应用功能)网元发送的用于管理第三方服务的第一管理请求。
在本公开的一个实施例之中,上述第一管理请求中指示有第三方应用所能提供的第三方服务。其中,该第三方应用可以为除了终端设备、网络设备以及网络控制面的网元之外的应用,该第三方服务例如可以为第三方应用提供的游戏服务、语音服务等。
以及,在本公开的一个实施例之中,该第一管理请求可以是第三方应用通过AF网元发送至NEF网元的。
进一步地,在本公开的一个实施例之中,上述第一管理请求可以为用于注册第三方服务的第一注册请求和/或用于注销第三方服务的第一注销请求。关于该部分内容会在后续实施例进行详细介绍。
此外,在本公开的一个实施例之中,NEF网元可以通过SBI(Southbound Interface,南向接口)接口接收AF网元发送的用于管理第三方服务的第一管理请求。
步骤202、基于第一管理请求对第三方服务进行管理。
其中,在本公开的一个实施例之中,当第一管理请求为第一注册请求时,NEF网元会基于第一注册请求对第三方服务进行注册管理。以及,在本公开的另一个实施例之中,当第一管理请求为第一注销 请求时,NEF网元会基于第一注销请求对第三方服务进行注销管理。关于具体如何注册管理和注销管理会在后续实施例中进行详细介绍。
步骤203、向AF网元返回管理结果。
其中,在本公开的一个实施例之中,当第一管理请求为用于注册第三方服务的第一注册请求时,该管理结果可以包括注册成功响应或注册失败响应。
以及,在本公开的一个实施例之中,当第一管理请求为用于注销第三方服务的第一注销请求时,该管理结果可以包括注销成功响应或注销失败响应。
综上所述,在本公开实施例提供的第三方服务管理方法之中,NEF网元会接收AF网元发送的用于管理第三方服务的第一管理请求,第一管理请求中指示有第三方应用所提供的第三方服务,之后,NEF网元会基于第一管理请求对第三方服务进行管理,并向AF网元返回管理结果。也即是,本公开提供了的第三方服务管理方法中,NEF网元可以对第三方服务进行管理,如具体可以对第三方服务进行注册和/或注销管理,由此NEF网元能够知晓第三方应用具体可以提供哪些第三方服务,则网络后续可以通过NEF网元调用该第三方服务,提高了网络服务的丰富性。
图3为本公开实施例所提供的一种第三方服务管理方法的流程示意图,该方法由NEF网元执行,如图3所示,该第三方服务管理方法可以包括以下步骤:
步骤301、接收AF网元发送的用于注册第三方服务的第一注册请求。
其中,在本公开的一个实施之中,该第一注册请求可以是当第三方应用需要注册某第三方服务时,通过AF网元发送至NEF网元的。
以及,在本公开的一个实施例之中,上述第一注册请求可以包括请求注册的第三方服务的注册信息。
具体的,在本公开的一个实施例之中,上述注册信息可以包括以下至少一种:
第三方服务对应的NF(Network Function,网络功能)的ID(Identifier,标识);
第三方服务对应的NF类型;
第三方服务对应的NF支持业务;
第三方应用对应的PLMN(Public Land Mobile Network,公共陆地移动网)的ID。
其中,在本公开的一个实施例之中,上述的第三方服务对应的NF类型可以为该第三方服务所属的NF类型,该NF类型可以包括AI服务类型、感知服务类型等。示例的,若该第三方服务为语音服务,则该第三方服务对应的NF类型可以为AI服务类型。
以及,在本公开的一个实施例之中,上述第三方服务对应的NF支持业务可以包括以下至少一种:
实现该第三方服务时所需执行的业务;
执行该业务时的实际执行策略。
示例的,假设该第三方服务为语音服务,则该第三方服务对应的NF支持业务可以包括语音业务以及执行语音业务时的实际执行策略(如实际执行该语音业务时的实际收费策略等)。
步骤302、基于第三方服务的注册信息确定第三方服务是否满足授权条件。
其中,在本公开的一个实施例之中,NEF网元基于第三方服务的注册信息确定第三方服务是否满足授权条件的方法可以包括以下步骤:
步骤一、确定第三方应用是否具备注册资格。
具体的,在本公开的一个实施例之中,NEF网元中存储有一列表,该列表中包括了具备向NF网元提供服务的能力的第三方应用对应的PLMN的ID。基于此,NEF网元可以查找该列表中是否包括上述第一注册请求中的第三方应用对应的PLMN的ID,其中,若该列表中不包括第一注册请求中的PLMN的ID,说明该第一注册请求所请求注册的第三方服务对应的第三方应用不具备向NF网元提供服务的能力,则确定第三方服务不满足授权条件;若该列表中包括上述第一注册请求中的PLMN的ID,则说明该第一注册请求所请求注册的第三方服务对应的第三方应用具备向NF网元提供服务的能力,则进一步执行步骤二。
步骤二、确定第三方服务是否具备注册资格。
其中,在本公开的一个实施例之中,可以基于第一注册请求中第三方服务对应的NF类型和第三方 服务对应的NF支持业务来确定第三方服务是否具备注册资格。
具体的,在本公开的一个实施例之中,PCF(Policy Control Function,策略控制功能)会通过广播向NEF网元下发每个NF类型下的各个业务对应的标准执行策略以及准入策略。其中,该标准执行策略具体为针对各个业务定义的标准的执行策略。示例的,语音业务对应的标准执行测量例如可以为标准收费策略。以及,上述的准入策略用于确定第三方服务是否具备注册资格;其中,该准入策略具体包括:若实现待注册的第三方服务时所需执行的业务对应的实际执行策略与实现待注册的第三方服务时所需执行的业务对应的标准执行策略之间的偏差小于预设阈值,则说明待注册的第三方服务具备注册资格;若实现待注册的第三方服务时所需执行的业务对应的实际执行策略与实现待注册的第三方服务时所需执行的业务对应的标准执行策略之间的偏差不小于预设阈值,则说明待注册的第三方服务不具备注册资格。
基于此,在本公开的一个实施例,当NEF网元确定出各个业务对应的标准执行策略以及准入策略后,该NEF网元可以基于第一注册请求中包括的第三方服务对应的NF类型和实现该第三方服务时所需执行的业务确定该第一注册请求所请求注册的第三方服务对应的标准执行策略,之后,基于该第一注册请求所请求注册的第三方服务对应的标准执行策略和上述的准入策略确定该第一注册请求所请求注册的第三方服务是否具备注册资格。其中,当确定第一注册请求所请求注册的第三方服务是否具备注册资格时,确定其满足授权条件,当确定第一注册请求所请求注册的第三方服务不具备注册资格,确定其不满足授权条件
步骤303、响应于确定第三方服务满足授权条件,存储第三方服务对应的NF的ID。
其中,在本公开的一个实施例之中,响应于确定第三方服务满足授权条件,NEF网元可以将第三方服务对应的NF的ID和PLMN的ID对应关联存储,以便当后续NRF网元对该第三方服务注册成功后,该NEF网元可以基于第三方应用对应的PLMN的ID和第三方服务对应的NF的ID调用该第三方服务。
步骤304、向NRF网元发送用于注册第三方服务的第二注册请求。
其中,在本公开的一个实施例之中,第二注册请求可以包括注册信息和NEF ID。
以及,在本公开的一个实施例之中,NEF网元可以通过Nnrf_NFManagement_NFRegister向NRF网元发送用于注册第三方服务的第二注册请求。
进一步地,在本公开的一个实施例之中,NRF网元接收到用于注册第三方服务的第二注册请求之后,可以根据第二注册请求中包括的注册信息和NEF ID完成对该第三方服务的注册管理。
步骤305、接收NRF网元发送的注册成功响应。
其中,在本公开的一个实施例之中,该注册成功响应用于指示该第三方服务已在NRF网元完成注册。
步骤306、向AF网元返回注册成功响应。
其中,在本公开的一个实施例之中,该注册成功响应用于指示第三方服务已注册成功,此时,网络设备后续可以调用该第三方服务,如网络设备后续可以通过调用AF网元来向NF网元提供该第三方服务。
综上所述,在本公开实施例提供的第三方服务管理方法之中,NEF网元会接收AF网元发送的用于管理第三方服务的第一管理请求,第一管理请求中指示有第三方应用所提供的第三方服务,之后,NEF网元会基于第一管理请求对第三方服务进行管理,并向AF网元返回管理结果。也即是,本公开提供了的第三方服务管理方法中,NEF网元可以对第三方服务进行管理,如具体可以对第三方服务进行注册和/或注销管理,由此NEF网元能够知晓第三方应用具体可以提供哪些第三方服务,则网络后续可以通过NEF网元调用该第三方服务,提高了网络服务的丰富性。
图4为本公开实施例所提供的一种第三方服务管理方法的流程示意图,该方法由NEF网元执行,如图4所示,该第三方服务管理方法可以包括以下步骤:
步骤401、接收AF网元发送的用于注册第三方服务的第一注册请求。
步骤402、基于第三方服务的注册信息确定第三方服务是否满足授权条件。
其中,关于步骤401-步骤402的详细介绍可以参考上述实施例描述,本公开实施例在此不做赘述。
步骤403、响应于第三方服务的注册信息不满足授权条件,确定第三方服务注册失败。
其中,在本公开的一个实施例之中,当第三方服务的注册信息不满足授权条件时,说明该第三方应用可能不具备注册资格,或者,该第三方服务可能不具备注册资格,此时无法对该第一注册请求所请求注册的第三方服务进行注册,则确定第三方服务注册失败。
步骤404、向AF网元返回注册失败响应。
其中,在本公开的一个实施例之中,该注册失败响应用于指示第三方服务未注册成功。
综上所述,在本公开实施例提供的第三方服务管理方法之中,NEF网元会接收AF网元发送的用于管理第三方服务的第一管理请求,第一管理请求中指示有第三方应用所提供的第三方服务,之后,NEF网元会基于第一管理请求对第三方服务进行管理,并向AF网元返回管理结果。也即是,本公开提供了的第三方服务管理方法中,NEF网元可以对第三方服务进行管理,如具体可以对第三方服务进行注册和/或注销管理,由此NEF网元能够知晓第三方应用具体可以提供哪些第三方服务,则网络后续可以通过NEF网元调用该第三方服务,提高了网络服务的丰富性。
图5为本公开实施例所提供的一种第三方服务管理方法的流程示意图,该方法由NEF网元执行,如图5所示,该第三方服务管理方法可以包括以下步骤:
步骤501、接收AF网元发送的用于注销第三方服务的第一注销请求。
其中,在本公开的一个实施之中,该第一注销请求可以是当第三方应用需要注销某第三方服务时,通过AF网元发送至NEF网元的。
以及,在本公开的一个实施例之中,上述第一注销请求可以包括请求注销的第三方服务的注销信息。
具体的,在本公开的一个实施例之中,上述注销信息包括以下至少一种:
第三方服务对应的NF的ID;
第三方应用对应的PLMN的ID。
步骤502、基于第三方服务的注销信息确定第三方服务是否满足注销条件。
在本公开的一个实施例之中,可以基于第一注销请求中的NF的ID确定第三方服务是否满足注销条件。具体的,NEF网元查找其是否存储了上述第一注销请求中的NF的ID,若NEF网元中存储了上述第一注销请求中的NF的ID,说明该NF的ID对应的第三方服务已注册,则可以对该第三方服务进行注销,确定第三方服务满足注销条件;若NEF网元中未存储上述第一注销请求中的NF的ID,说明该NF的ID对应的第三方服务未注册,则此时,无法对该第三方服务进行注销,确定第三方服务不满足注销条件。
以及,在本公开的另一个实施例之中,可以基于第一注销请求中的NF的ID和PLMN的ID来确定第三方服务是否满足注销条件。具体的,针对一个第三方应用会注册多个第三方服务,此时,NEF网元中一个PLMN的ID会关联多个不同NF的ID。以及,一个第三方服务可能会被注册至多个不同的第三方应用,此时NEF网元中一个NF的ID可能会关联多个不同的PLMN的ID。例如,第三方应用1和第三方应用2均提供有语音服务,且均在NEF网元中已注册,由此,NEF网元中第三方应用1对应的PLMN的ID#1关联有该语音服务对应的NF的ID,同时,第三方应用2对应的PLMN的ID#1也关联有该语音服务对应的NF的ID。
基于此,当要注销某个第三方服务时,应该还需要明确出具体是针对哪一个第三方应用来注销该第三方服务,而若明确出的第三方应用与想要注销的第三方服务之间不存在关联关系的,则说明该想要注销的第三方服务未针对该第三方应用进行注册,则该第三方服务无法针对该第三方应用进行注销,不满足注销条件的;若明确出的第三方应用与想要注销的第三方服务之间存在关联关系,则说明该想要注销的第三方服务针对该第三方应用进行了注册,则该第三方服务可以针对该第三方应用进行注销,满足注销条件的。
示例的,假设NEF网元中PLMN的ID#1关联有NF的ID#1和NF的ID#2,PLMN的ID#2关联有NF的ID#1,基于此,若上述步骤501的第一注销请求中包括NF的ID#2和PLMN的ID#2,则由于NF的ID2和PLMN的ID#2在NEF网元不存在关联关系,此时确定该第三方服务不满足注销条件;若 上述步骤501的第一注销请求中包括NF的ID#2和PLMN的ID#1,则由于NF的ID#2和PLMN的ID#1在NEF网元存在关联关系,此时确定该第三方服务满足注销条件。
步骤503、响应于确定第三方服务满足注销条件,向NRF网元发送用于注销第三方服务的第二注销请求。
其中,在本公开的一个实施例之中,上述第二注销请求可以包括注销信息。
以及,在本公开的一个实施例之中,NEF网元可以通过Nnrf_NFManagement_NFDeregister向NRF网元发送用于注销第三方服务的第二注销请求。
进一步地,在本公开的一个实施例之中,NRF网元接收用于注销第三方服务的第二注销请求之后,可以根据第二注销请求中包括的注销消息完成对该第三方服务的注销管理。
步骤504、响应于接收NRF网元发送的注销成功响应,删除第三方服务对应的NF的ID。
其中,在本公开的一个实施例之中,该注销成功响应用于指示该第三方服务已在NRF网元完成注销,此时,NEF网元可以删除该NF的ID,或者,删除该NF的ID与PLMN的ID的关联关系,从而在NEF网元中完成对该第三方服务的注销。
步骤505、向AF网元返回注销成功响应。
其中,在本公开的一个实施例之中,该注册成功响应用于指示第三方服务已注销成功,此时,网络设备后续不可以再调用该第三方服务。
综上所述,在本公开实施例提供的第三方服务管理方法之中,NEF网元会接收AF网元发送的用于管理第三方服务的第一管理请求,第一管理请求中指示有第三方应用所提供的第三方服务,之后,NEF网元会基于第一管理请求对第三方服务进行管理,并向AF网元返回管理结果。也即是,本公开提供了的第三方服务管理方法中,NEF网元可以对第三方服务进行管理,如具体可以对第三方服务进行注册和/或注销管理,由此NEF网元能够知晓第三方应用具体可以提供哪些第三方服务,则网络后续可以通过NEF网元调用该第三方服务,提高了网络服务的丰富性。
图6为本公开实施例所提供的一种第三方服务管理方法的流程示意图,该方法由NEF网元执行,如图6所示,该第三方服务管理方法可以包括以下步骤:
步骤601、接收AF网元发送的用于注销第三方服务的第一注销请求。
步骤602、基于第三方服务的注销信息确定第三方服务是否满足注销条件。
其中,关于步骤601-步骤602的详细介绍可以参考上述实施例描述,本公开实施例在此不做赘述。
步骤603、响应于第三方服务的注销信息不满足注销条件,确定第三方服务注销失败。
步骤604、向AF网元返回注销失败响应。
其中,在本公开的一个实施例之中,该注册失败响应用于指示第三方服务注销失败。
综上所述,在本公开实施例提供的第三方服务管理方法之中,NEF网元会接收AF网元发送的用于管理第三方服务的第一管理请求,第一管理请求中指示有第三方应用所提供的第三方服务,之后,NEF网元会基于第一管理请求对第三方服务进行管理,并向AF网元返回管理结果。也即是,本公开提供了的第三方服务管理方法中,NEF网元可以对第三方服务进行管理,如具体可以对第三方服务进行注册和/或注销管理,由此NEF网元能够知晓第三方应用具体可以提供哪些第三方服务,则网络后续可以通过NEF网元调用该第三方服务,提高了网络服务的丰富性。
图7为本公开实施例所提供的一种第三方服务管理方法的流程示意图,该方法由NRF网元执行,如图7所示,该第三方服务管理方法可以包括以下步骤:
步骤701、接收NEF网元发送的用于管理第三方服务的第二管理请求。
其中,在本公开的一个实施例之中,第二管理请求中指示有第三方应用所提供的第三方服务。
以及,在本公开的一个实施例之中,该第三方服务可以为由第三方应用所提供的服务(如游戏服务、语音服务等),该第三方应用可以为除了终端设备、网络设备以及网络控制面的网元之外的应用。
进一步地,在本公开的一个实施例之中,上述第二管理请求可以为用于注册第三方服务的第二注册请求和/或用于注销第三方服务的第二注销请求。其中,关于第二注册请求和第二注销请求的详细介绍可以参考上述实施例描述。。
步骤702、基于第二管理请求对第三方服务进行管理。
其中,在本公开的一个实施例之中,当第二管理请求为第二注册请求时,NRF网元会基于第二注册请求对第三方服务进行注册管理。以及,在本公开的另一个实施例之中,当第二管理请求为第二注销请求时,NRF网元会基于第二注销请求对第三方服务进行注销管理。关于具体如何注册管理和注销管理会在后续实施例中进行详细介绍。
步骤703、向NEF网元返回管理结果。
其中,在本公开的一个实施例之中,当第二管理请求为用于注册第三方服务的第二注册请求时,管理结果可以包括注册成功响应。
以及,在本公开的一个实施例之中,当第二管理请求为用于注销第三方服务的第二注销请求时,管理结果可以包括注销成功响应。
综上所述,在本公开实施例提供的第三方服务管理方法之中,NEF网元会接收AF网元发送的用于管理第三方服务的第一管理请求,第一管理请求中指示有第三方应用所提供的第三方服务,之后,NEF网元会基于第一管理请求对第三方服务进行管理,并向AF网元返回管理结果。也即是,本公开提供了的第三方服务管理方法中,NEF网元可以对第三方服务进行管理,如具体可以对第三方服务进行注册和/或注销管理,由此NEF网元能够知晓第三方应用具体可以提供哪些第三方服务,则网络后续可以通过NEF网元调用该第三方服务,提高了网络服务的丰富性。
图8为本公开实施例所提供的一种第三方服务管理方法的流程示意图,该方法由NRF网元执行,如图8所示,该第三方服务管理方法可以包括以下步骤:
步骤801、接收NEF网元发送的用于注册第三方服务的第二注册请求。
其中,在本公开的一个实施例之中,第二注册请求可以包括请求注册的第三方服务的注册信息和NEF ID。
以及,在本公开的一个实施例之中,上述注册信息可以包括以下至少一种:
第三方服务对应的NF的ID;
第三方服务对应的NF类型;
第三方服务对应的NF支持业务;
第三方应用对应的PLMN的ID。
进一步地,在本公开的一个实施例之中,NRF网元可以通过Nnrf_NFManagement_NFRegister接收NEF网元发送的用于注册第三方服务的第二注册请求。
关于注册信息的详细介绍,可以参考上述实施例中的相关介绍,本公开实施例在此不做赘述。
步骤802、基于第二注册请求对第三方服务进行注册管理。
其中,在本公开的一个实施例之中,上述基于第二注册请求对第三方服务进行注册管理的方法可以包括以下至少一种:
基于第三方服务的注册信息和NEF ID为第三方服务注册生成对应的配置文件;
将第三方服务对应的可用状态设置为可用。
需要说明的是,在本公开的一个实施例之中,当基于第三方服务的注册信息和NEF ID为第三方服务注册生成对应的配置文件并存储后,则说明该第三方服务已经在NRF网元完成注册。以及,当NRF网元将第三方服务对应的可用状态设置为可用时,也可以说明该第三方服务已经在NRF网元完成注册。
进一步地,在本公开的一个实施例之中,上述将第三方服务对应的可用状态设置为可用的方法可以包括:针对该第三方服务设置一可用状态信息,并通过将该第三方服务对应的可用状态信息设置为第一数值来指示该第三方服务为可用状态。其中,在本公开的一个实施例之中,上述第一数值可以为1。
步骤803、向NEF网元返回注册成功响应。
关于本实施例中其它内容的详细介绍可以参考上述实施例中的相关介绍,本公开的实施例在此不做赘述。
综上所述,在本公开实施例提供的第三方服务管理方法之中,NEF网元会接收AF网元发送的用于管理第三方服务的第一管理请求,第一管理请求中指示有第三方应用所提供的第三方服务,之后,NEF 网元会基于第一管理请求对第三方服务进行管理,并向AF网元返回管理结果。也即是,本公开提供了的第三方服务管理方法中,NEF网元可以对第三方服务进行管理,如具体可以对第三方服务进行注册和/或注销管理,由此NEF网元能够知晓第三方应用具体可以提供哪些第三方服务,则网络后续可以通过NEF网元调用该第三方服务,提高了网络服务的丰富性。
图9为本公开实施例所提供的一种第三方服务管理方法的流程示意图,该方法由NRF网元执行,如图9所示,该第三方服务管理方法可以包括以下步骤:
步骤901、接收NEF网元发送的用于注册第三方服务的第二注册请求。
步骤902、基于第二注册请求对第三方服务进行注册管理。
其中,关于步骤901-步骤902的详细介绍可以参考上述实施例描述,本公开实施例在此不做赘述。
步骤903、向特定NF网元发送第一通知消息。
其中,在本公开的一个实施例之中,特定NF网元可以为订阅了服务变更事件的网元,其中,该服务变更事件可以包括服务注册事件和/或服务注销事件等。以及,该特定NF网元具体可以理解为:当发生了服务变更事件(如服务注册事件和/或服务变更事件)时,需要通知的NF网元。
以及,在本公开的一个实施例之中,该第一通知消息用于通知该特定NF网元第三方服务已完成注册。该第一通知消息可以包括第三方应用对应的PLMD ID和第三方服务对应的NF的ID。
进一步地,在本公开的一个实施例之中,通过向特定NF网元发送该第一通知消息,以便该特定NF网元可以知悉该第一通知消息指示的第三方服务已被完成注册,从而该特定NF网元后续可以请求使用该第三方服务。
关于本实施例中其它内容的详细介绍可以参考上述实施例中的相关介绍,本公开的实施例在此不做赘述。
综上所述,在本公开实施例提供的第三方服务管理方法之中,NEF网元会接收AF网元发送的用于管理第三方服务的第一管理请求,第一管理请求中指示有第三方应用所提供的第三方服务,之后,NEF网元会基于第一管理请求对第三方服务进行管理,并向AF网元返回管理结果。也即是,本公开提供了的第三方服务管理方法中,NEF网元可以对第三方服务进行管理,如具体可以对第三方服务进行注册和/或注销管理,由此NEF网元能够知晓第三方应用具体可以提供哪些第三方服务,则网络后续可以通过NEF网元调用该第三方服务,提高了网络服务的丰富性。
图10为本公开实施例所提供的一种第三方服务管理方法的流程示意图,该方法由NRF网元执行,如图10所示,该第三方服务管理方法可以包括以下步骤:
步骤1001、接收NEF网元发送的用于注销第三方服务的第二注销请求。
其中,在本公开的一个实施例之中,第二注销请求可以包括请求注销的第三方服务的注销信息。
以及,在本公开的一个实施例之中,上述注销信息可以包括以下至少一种:
第三方服务对应的NF的ID;
第三方应用对应的PLMN的ID。
进一步地,在本公开的一个实施例之中,NRF网元可以通过Nnrf_NFManagement_NFDeregister接收NEF网元发送的用于注销第三方服务的第二注销请求。
步骤1002、基于第二注销请求对第三方服务进行注销管理。
其中,在本公开的一个实施例之中,上述基于第二注销请求对第三方服务进行注销管理的方法可以包括以下至少一种:
基于第三方服务对应的注销信息删除第三方服务对应的配置文件;
将第三方服务的可用状态设置为不可用。
需要说明的是,在本公开的一个实施例之中,当基于第三方服务的注销信息删除第三方服务对应的配置文件后,则说明该第三方服务已经在NRF网元完成注销。以及,当NRF网元将第三方服务对应的可用状态设置为不可用时,也可以说明该第三方服务已经在NRF网元完成注销。
进一步地,在本公开的一个实施例之中,上述将第三方服务对应的可用状态设置为不可用的方法可以包括:针对该第三方服务设置一可用状态信息,并通过将该第三方服务对应的可用状态信息设置为第 二数值来指示该第三方服务为不可用状态。其中,在本公开的一个实施例之中,上述第二数值可以为0。
步骤1003、向NEF网元返回注销成功响应。
关于本实施例中其它内容的详细介绍可以参考上述实施例中的相关介绍,本公开的实施例在此不做赘述。
综上所述,在本公开实施例提供的第三方服务管理方法之中,NEF网元会接收AF网元发送的用于管理第三方服务的第一管理请求,第一管理请求中指示有第三方应用所提供的第三方服务,之后,NEF网元会基于第一管理请求对第三方服务进行管理,并向AF网元返回管理结果。也即是,本公开提供了的第三方服务管理方法中,NEF网元可以对第三方服务进行管理,如具体可以对第三方服务进行注册和/或注销管理,由此NEF网元能够知晓第三方应用具体可以提供哪些第三方服务,则网络后续可以通过NEF网元调用该第三方服务,提高了网络服务的丰富性。
图11为本公开实施例所提供的一种第三方服务管理方法的流程示意图,该方法由NRF执行,如图11所示,该第三方服务管理方法可以包括以下步骤:
步骤1101、接收NEF网元发送的用于注销第三方服务的第二注销请求。
步骤1102、基于第二注销请求对第三方服务进行注销管理。
其中,关于步骤1101-步骤1102的详细介绍可以参考上述实施例描述,本公开实施例在此不做赘述。
步骤1103、向特定NF网元发送第二通知消息。
其中,在本公开的一个实施例之中,特定NF网元可以为订阅了服务变更事件的网元,其中,该服务变更事件可以包括服务注册事件和/或服务注销事件等。以及,该特定NF网元具体可以理解为:当发生了服务变更事件(如服务注册事件和/或服务变更事件)时,需要通知的NF网元。
以及,在本公开的一个实施例之中,该第二通知消息用于通知该特定NF网元第三方服务已完成注销。该第二通知消息可以包括第三方应用对应的PLMD ID和第三方服务对应的NF的ID。
进一步地,在本公开的一个实施例之中,通过向特定NF网元发送该第二通知消息,以便该特定NF网元可以知悉该第二通知消息指示的第三方服务已被完成注销,从而该特定NF网元不可以再请求使用该第三方服务。
关于本实施例中其它内容的详细介绍可以参考上述实施例中的相关介绍,本公开的实施例在此不做赘述。
综上所述,在本公开实施例提供的第三方服务管理方法之中,NEF网元会接收AF网元发送的用于管理第三方服务的第一管理请求,第一管理请求中指示有第三方应用所提供的第三方服务,之后,NEF网元会基于第一管理请求对第三方服务进行管理,并向AF网元返回管理结果。也即是,本公开提供了的第三方服务管理方法中,NEF网元可以对第三方服务进行管理,如具体可以对第三方服务进行注册和/或注销管理,由此NEF网元能够知晓第三方应用具体可以提供哪些第三方服务,则网络后续可以通过NEF网元调用该第三方服务,提高了网络服务的丰富性。
图12为本公开实施例所提供的一种第三方服务管理方法的流程示意图,该方法由AF网元执行,如图12所示,该第三方服务管理方法可以包括以下步骤:
步骤1201、向NEF网元发送用于管理第三方服务的第一管理请求。
其中,在本公开的一个实施例之中,第一管理请求中指示有第三方应用所提供的第三方服务。
以及,在本公开的一个实施例之中,该第三方服务可以为由第三方应用所提供的服务(如游戏服务、语音服务等),该第三方应用可以为除了终端设备、网络设备以及网络控制面的网元之外的应用。
进一步地,在本公开的一个实施例之中,上述第一管理请求可以为用于注册第三方服务的第一注册请求和/或用于注销第三方服务的第一注销请求。关于该部分内容会在后续实施例进行详细介绍。
步骤1202、接收NEF网元返回的管理结果。
其中,在本公开的一个实施例之中,当第一管理请求为用于注册第三方服务的第一注册请求时,管理结果可以包括注册成功响应或注册失败响应。
以及,在本公开的一个实施例之中,当第一管理请求为用于注销第三方服务的第一注销请求时,管理结果可以包括注销成功响应或注销失败响应。
综上所述,在本公开实施例提供的第三方服务管理方法之中,NEF网元会接收AF网元发送的用于管理第三方服务的第一管理请求,第一管理请求中指示有第三方应用所提供的第三方服务,之后,NEF网元会基于第一管理请求对第三方服务进行管理,并向AF网元返回管理结果。也即是,本公开提供了的第三方服务管理方法中,NEF网元可以对第三方服务进行管理,如具体可以对第三方服务进行注册和/或注销管理,由此NEF网元能够知晓第三方应用具体可以提供哪些第三方服务,则网络后续可以通过NEF网元调用该第三方服务,提高了网络服务的丰富性。
图13为本公开实施例所提供的一种第三方服务管理方法的流程示意图,该方法由AF网元执行,如图13所示,该第三方服务管理方法可以包括以下步骤:
步骤1301、向NEF网元发送用于注册第三方服务的第一注册请求。
其中,在本公开的一个实施例之中,上述第一注册请求可以包括第三方服务的注册信息。
以及,在本公开的一个实施例之中,上述注册信息可以包括以下至少一种:
第三方服务对应的NF的ID;
第三方服务对应的NF类型;
第三方服务对应的NF支持业务;
第三方应用对应的PLMN的ID。
步骤1302、接收NEF网元返回的注册成功响应。
其中,在本公开的一个实施例之中,该注册成功响应用于指示第三方服务已注册成功,此时,网络设备后续可以调用该第三方服务,如网络设备后续可以通过调用AF网元来向NF网元提供该第三方服务。
关于本实施例中其它内容的详细介绍可以参考上述实施例中的相关介绍,本公开的实施例在此不做赘述。
综上所述,在本公开实施例提供的第三方服务管理方法之中,NEF网元会接收AF网元发送的用于管理第三方服务的第一管理请求,第一管理请求中指示有第三方应用所提供的第三方服务,之后,NEF网元会基于第一管理请求对第三方服务进行管理,并向AF网元返回管理结果。也即是,本公开提供了的第三方服务管理方法中,NEF网元可以对第三方服务进行管理,如具体可以对第三方服务进行注册和/或注销管理,由此NEF网元能够知晓第三方应用具体可以提供哪些第三方服务,则网络后续可以通过NEF网元调用该第三方服务,提高了网络服务的丰富性。
图14为本公开实施例所提供的一种第三方服务管理方法的流程示意图,该方法由AF网元执行,如图14所示,该第三方服务管理方法可以包括以下步骤:
步骤1401、向NEF网元发送用于注册第三方服务的第一注册请求。
步骤1402、接收NEF网元返回的注册失败响应。
其中,在本公开的一个实施例之中,该注册失败响应用于指示第三方服务未注册成功,此时,网络设备不可以调用该第三方服务。
关于本实施例中其它内容的详细介绍可以参考上述实施例中的相关介绍,本公开的实施例在此不做赘述。
综上所述,在本公开实施例提供的第三方服务管理方法之中,NEF网元会接收AF网元发送的用于管理第三方服务的第一管理请求,第一管理请求中指示有第三方应用所提供的第三方服务,之后,NEF网元会基于第一管理请求对第三方服务进行管理,并向AF网元返回管理结果。也即是,本公开提供了的第三方服务管理方法中,NEF网元可以对第三方服务进行管理,如具体可以对第三方服务进行注册和/或注销管理,由此NEF网元能够知晓第三方应用具体可以提供哪些第三方服务,则网络后续可以通过NEF网元调用该第三方服务,提高了网络服务的丰富性。
图15为本公开实施例所提供的一种第三方服务管理方法的流程示意图,该方法由AF网元执行,如图15所示,该第三方服务管理方法可以包括以下步骤:
步骤1501、向NEF网元发送用于注册第三方服务的第一注销请求。
其中,在本公开的一个实施例之中,第一注销请求包括所述第三方服务的注销信息。
以及,在本公开的一个实施例之中,注销信息可以包括以下至少一种:
第三方服务对应的NF的ID;
第三方应用对应的PLMN的ID。
关于本实施例中其它内容的详细介绍可以参考上述实施例中的相关介绍,本公开的实施例在此不做赘述。
步骤1502、接收NEF网元返回的注销成功响应。
其中,在本公开的一个实施例之中,该注册成功响应用于指示第三方服务已注销成功,此时,网络设备后续不可以再调用该第三方服务。
关于本实施例中其它内容的详细介绍可以参考上述实施例中的相关介绍,本公开的实施例在此不做赘述。
综上所述,在本公开实施例提供的第三方服务管理方法之中,NEF网元会接收AF网元发送的用于管理第三方服务的第一管理请求,第一管理请求中指示有第三方应用所提供的第三方服务,之后,NEF网元会基于第一管理请求对第三方服务进行管理,并向AF网元返回管理结果。也即是,本公开提供了的第三方服务管理方法中,NEF网元可以对第三方服务进行管理,如具体可以对第三方服务进行注册和/或注销管理,由此NEF网元能够知晓第三方应用具体可以提供哪些第三方服务,则网络后续可以通过NEF网元调用该第三方服务,提高了网络服务的丰富性。
图16为本公开实施例所提供的一种第三方服务管理方法的流程示意图,该方法由AF网元执行,如图16所示,该第三方服务管理方法可以包括以下步骤:
步骤1601、向NEF网元发送用于注册第三方服务的第一注销请求。
步骤1602、接收NEF网元返回的注销失败响应。
其中,在本公开的一个实施例之中,当AF网元接收到NEF网元返回的注销失败响应,说明该第三方服务注销失败。
关于本实施例中其它内容的详细介绍可以参考上述实施例中的相关介绍,本公开的实施例在此不做赘述。
综上所述,在本公开实施例提供的第三方服务管理方法之中,NEF网元会接收AF网元发送的用于管理第三方服务的第一管理请求,第一管理请求中指示有第三方应用所提供的第三方服务,之后,NEF网元会基于第一管理请求对第三方服务进行管理,并向AF网元返回管理结果。也即是,本公开提供了的第三方服务管理方法中,NEF网元可以对第三方服务进行管理,如具体可以对第三方服务进行注册和/或注销管理,由此NEF网元能够知晓第三方应用具体可以提供哪些第三方服务,则网络后续可以通过NEF网元调用该第三方服务,提高了网络服务的丰富性。
基于上述描述,图17为本公开一个实施例提供的一种第三方服务注册的交互方法,如图17所示,该交互方法可以包括以下步骤:
步骤1701、AF网元向NEF网元发送新的第三方服务的注册请求(即上述实施例中的第一注册请求),以在核心网中进行服务注册流程。
步骤1702、NEF网元授权AF网元的注册请求,若NEF网元授权成功,则NEF网元存储该第三方服务对应的NF的ID,并执行步骤1704至步骤1705;若授权失败,执行步骤1703。
步骤1703、向AF网元返回一个Result值(False)(即上述实施例中的注册失败响应),表示授权失败,并结束流程。
步骤1704、NEF网元通过Nnrf_NFManagement_NFRegister将第三方服务的注册信息与NEF ID发送至NRF网元(如携带于上述的第二注册请求中发送至NRF网元)。
步骤1705、NRF网元基于基于第三方服务的注册信息和NEF ID为第三方服务注册生成对应的配置文件,并将第三方服务对应的可用状态设置为可用,通知订阅了服务变更事件的其他所有NF网元,如向其他所有NF网元发送第一通知消息(该步骤图17中未示出),以及,NRF网元通过NEF网元向AF网元返回注册成功响应。
基于上述描述,图18为本公开一个实施例提供的一种第三方服务注销的交互方法,如图18所示, 该交互方法可以包括以下步骤:
步骤1801、AF网元向NEF网元发送第三方服务的注销请求(即上述实施例中的第一注销请求),以在核心网中进行服务注册流程。
步骤1802、NEF网元根据接收到注销请求中的NF的ID,查找该NF的ID是否已成功注册,若未查找到NF的ID,则第三方服务未成功注册,则执行步骤1803;若查找到NF的ID,则第三方服务已成功注册,则执行步骤1804至步骤1805。
步骤1803、向AF网元返回返回一个Result值(False)(即上述实施例中的注销失败响应),表示注销失败,并结束流程。
步骤1804、NEF网元通过Nnrf_NFManagement_NFDeregister将第三方服务的注销信息发送至NRF网元(如携带于上述的第二注销请求中发送至NRF网元)。
步骤1805、NRF网元基于第三方服务对应的注销信息删除第三方服务对应的配置文件,并将第三方服务的可用状态设置为不可用,通知订阅了服务变更事件的其他所有NF,如向其他所有NF网元发送第二通知消息(该步骤图18中未示出),以及,NRF网元通过NEF网元向AF返回注销成功响应。
上述本申请提供的实施例中,分别从网络设备、UE的角度对本申请实施例提供的方法进行了介绍。为了实现上述本申请实施例提供的方法中的各功能,网络设备和UE可以包括硬件结构、软件模块,以硬件结构、软件模块、或硬件结构加软件模块的形式来实现上述各功能。上述各功能中的某个功能可以以硬件结构、软件模块、或者硬件结构加软件模块的方式来执行。
图19为本公开实施例所提供的一种通信装置的结构示意图,如图19所示,装置可以包括:
收发模块1901,用于接收应用功能AF网元发送的用于管理第三方服务的第一管理请求,第一管理请求中指示有第三方应用所提供的第三方服务;
管理模块1902,用于基于第一管理请求对第三方服务进行管理;
所述收发模块1901,还用于向AF网元返回管理结果。
综上所述,在本公开实施例提供的通信装置之中,NEF网元会接收AF网元发送的用于管理第三方服务的第一管理请求,第一管理请求中指示有第三方应用所提供的第三方服务,之后,NEF网元会基于第一管理请求对第三方服务进行管理,并向AF网元返回管理结果。也即是,本公开提供了的第三方服务管理方法中,NEF网元可以对第三方服务进行管理,如具体可以对第三方服务进行注册和/或注销管理,由此NEF网元能够知晓第三方应用具体可以提供哪些第三方服务,则网络后续可以通过NEF网元调用该第三方服务,提高了网络服务的丰富性。
可选的,在本公开的一个实施例之中,上述收发模块1901,还用于:
接收AF网元发送的用于注册第三方服务的第一注册请求,第一注册请求包括所述第三方服务的注册信息;
注册信息包括以下至少一种:
第三方服务对应的NF的ID;
第三方服务对应的NF类型;
第三方服务对应的NF支持业务;
第三方应用对应的PLMN的ID。
可选的,在本公开的一个实施例之中,上述管理模块1902,还用于:
基于第三方服务的注册信息确定第三方服务是否满足授权条件;
响应于确定第三方服务满足授权条件,存储第三方服务对应的NF的ID;
向网络存储功能NRF网元发送用于注册第三方服务的第二注册请求,第二注册请求包括注册信息和NEF ID;
接收NRF网元发送的注册成功响应。
可选的,在本公开的一个实施例之中,上述收发模块1901,还用于:
向AF网元返回注册成功响应。
可选的,在本公开的一个实施例之中,上述管理模块1902,还用于:
基于第三方服务的注册信息确定第三方服务是否满足授权条件;
响应于第三方服务的注册信息不满足授权条件,确定第三方服务注册失败。
可选的,在本公开的一个实施例之中,上述收发模块1901,还用于:
向AF网元返回注册失败响应。
可选的,上述收发模块1901,还用于:
接收AF网元发送的用于注销第三方服务的第一注销请求,所述第一注销请求包括所述第三方服务的注销信息;
所述注销信息包括以下至少一种:
第三方服务对应的NF的ID;
第三方应用对应的PLMN的ID。
可选的,在本公开的一个实施例之中,上述管理模块1902,还用于:
基于所述第三方服务的注销信息确定所述第三方服务是否满足注销条件;
响应于确定所述第三方服务满足注销条件,向NRF网元发送用于注销第三方服务的第二注销请求,所述第二注销请求包括所述注销信息;
响应于接收所述NRF网元发送的注销成功响应,删除所述第三方服务对应的NF的ID。
可选的,在本公开的一个实施例之中,上述收发模块1901,还用于:
向所述AF网元返回注销成功响应。
可选的,在本公开的一个实施例之中,所述收发模块1901,还用于:
基于所述第三方服务的注销信息确定所述第三方服务是否满足注销条件;
响应于所述第三方服务的注销信息不满足注销条件,确定所述第三方服务注销失败。
可选的,在本公开的一个实施例之中,所述收发模块1901,还用于:
向所述AF网元返回注销失败响应。
图20为本公开实施例所提供的一种通信装置的结构示意图,如图20所示,装置可以包括:
收发模块2001,用于接收NEF网元发送的用于管理第三方服务的第二管理请求,所述第二管理请求中指示有第三方应用所提供的第三方服务;
管理模块2001,用于基于所述第二管理请求对所述第三方服务进行管理;
所述收发模块2001,还用于向所述NEF网元返回管理结果。
综上所述,在本公开实施例提供的通信装置之中,NEF网元会接收AF网元发送的用于管理第三方服务的第一管理请求,第一管理请求中指示有第三方应用所提供的第三方服务,之后,NEF网元会基于第一管理请求对第三方服务进行管理,并向AF网元返回管理结果。也即是,本公开提供了的第三方服务管理方法中,NEF网元可以对第三方服务进行管理,如具体可以对第三方服务进行注册和/或注销管理,由此NEF网元能够知晓第三方应用具体可以提供哪些第三方服务,则网络后续可以通过NEF网元调用该第三方服务,提高了网络服务的丰富性。
可选的,在本公开的一个实施例之中,上述收发模块2001,还用于:
接收NEF网元发送的用于注册第三方服务的第二注册请求,所述第二注册请求包括所述第三方服务的注册信息和NEF ID;
所述注册信息包括以下至少一种:
第三方服务对应的NF的ID;
第三方服务对应的NF类型;
第三方服务对应的NF支持业务;
第三方应用对应的PLMN的ID。
可选的,在本公开的一个实施例之中,所述管理模块2002,还用于:
基于所述第三方服务的注册信息和NEF ID为所述第三方服务注册生成对应的配置文件;
将所述第三方服务对应的可用状态设置为可用。
可选的,在本公开的一个实施例之中,上述收发模块2001,还用于:
向所述NEF网元返回注册成功响应。
可选的,在本公开的一个实施例之中,所述装置还用于:
向特定NF网元发送第一通知消息;所述特定NF网元为订阅了服务变更事件的网元,所述第一通知消息用于指示所述第三方服务已完成注册。
可选的,在本公开的一个实施例之中,上述收发模块2001,还用于:
接收NEF网元发送的用于注销第三方服务的第二注销请求,所述第二注销请求包括所述第三方服务的注销信息;
所述注销信息包括以下至少一种:
第三方服务对应的NF的ID;
第三方应用对应的PLMN的ID。
可选的,在本公开的一个实施例之中,上述管理模块2002,还用于:
基于所述第三方服务对应的注销信息删除所述第三方服务对应的配置文件;
将所述第三方服务的可用状态设置为不可用。
可选的,在本公开的一个实施例之中,上述收发模块2001,还用于:
所述NEF网元返回注销成功响应。
可选的,在本公开的一个实施例之中,所述装置还用于:
向特定NF网元发送第二通知消息;所述特定NF网元为订阅了服务变更事件的网元,所述第二通知消息用于指示所述第三方服务已完成注销。
图21a为本公开实施例所提供的一种通信装置的结构示意图,如图21a所示,装置可以包括:
收发模块2101a,用于向NEF网元发送用于管理第三方服务的第一管理请求,所述第一管理请求中指示有第三方应用所提供的第三方服务;
所述收发模块2101a,还用于接收所述NEF网元返回的管理结果。
综上所述,在本公开实施例提供的通信装置之中,NEF网元会接收AF网元发送的用于管理第三方服务的第一管理请求,第一管理请求中指示有第三方应用所提供的第三方服务,之后,NEF网元会基于第一管理请求对第三方服务进行管理,并向AF网元返回管理结果。也即是,本公开提供了的第三方服务管理方法中,NEF网元可以对第三方服务进行管理,如具体可以对第三方服务进行注册和/或注销管理,由此NEF网元能够知晓第三方应用具体可以提供哪些第三方服务,则网络后续可以通过NEF网元调用该第三方服务,提高了网络服务的丰富性。
可选的,在本公开的一个实施例之中,上述收发模块2101a,还用于:
向所述NEF网元发送用于注册第三方服务的第一注册请求,所述第一注册请求包括所述第三方服务的注册信息;
所述注册信息包括以下至少一种:
第三方服务对应的NF的ID;
第三方服务对应的NF类型;
第三方服务对应的NF支持业务;
第三方应用对应的PLMN的ID。
可选的,在本公开的一个实施例之中,上述收发模块2101a,还用于:
接收所述NEF网元返回的注册成功响应。
可选的,在本公开的一个实施例之中,上述收发模块2101a,还用于:
接收所述NEF网元返回的注册失败响应。
可选的,在本公开的一个实施例之中,上述收发模块2101a,还用于:
向NEF网元发送用于注册第三方服务的第一注销请求,所述第一注销请求包括所述第三方服务的注销信息;
所述注销信息包括以下至少一种:
第三方服务对应的NF的ID;
第三方应用对应的PLMN的ID。
可选的,在本公开的一个实施例之中,上述收发模块2101a,还用于:
接收所述NEF网元返回的注销成功响应。
可选的,在本公开的一个实施例之中,上述收发模块2101a,还用于:
接收所述NEF网元返回的注销失败响应。
图21b为本公开实施例所提供的一种通信系统的结构示意图,如图21b所示,系统可以包括:
第一网元(即上述实施例中的AF网元)2101b,用于发送用于管理第三方服务的第一管理请求,第一管理请求中指示有第三方应用所提供的第三方服务;
第二网元(即上述实施例中的NEF网元)2102b,用于接收用于管理第三方服务的第一管理请求并基于第一管理请求对第三方服务进行管理;
第二网元2102b,还用于发送用于管理第三方服务的第二管理请求,第二管理请求中指示有第三方应用所提供的第三方服务;
第三网元(即上述实施例中的NRF网元)2103b,用于接收用于管理第三方服务的第二管理请求,并基于第二管理请求对第三方服务进行管理,再向第二网元返回管理结果;
第二网元2102b,还用于向第一网元返回管理结果;
第一网元2101b,还用于接收第二网元返回的管理结果。
其中,在本公开的一个实施例之中,上述第一网元、第二网元、第三网元之间可以互相通信。
关于本实施例中其它内容的详细介绍可以参考上述实施例中的相关介绍,本公开的实施例在此不做赘述。
综上所述,在本公开实施例提供的通信系统之中,NEF网元会接收AF网元发送的用于管理第三方服务的第一管理请求,第一管理请求中指示有第三方应用所提供的第三方服务,之后,NEF网元会基于第一管理请求对第三方服务进行管理,并向AF网元返回管理结果。也即是,本公开提供了的第三方服务管理方法中,NEF网元可以对第三方服务进行管理,如具体可以对第三方服务进行注册和/或注销管理,由此NEF网元能够知晓第三方应用具体可以提供哪些第三方服务,则网络后续可以通过NEF网元调用该第三方服务,提高了网络服务的丰富性。
可选的,上述通信系统可以用于注册第三方服务,具体的:
第一网元,用于发送用于注册第三方服务的第一注册请求,第一注册请求中指示有第三方应用所提供的第三方服务;
第二网元,用于接收用于注册第三方服务的第一注册请求并基于第一注册请求对第三方服务进行注册管理;
第二网元,还用于发送用于注册第三方服务的第二注册请求,第二注册请求中指示有第三方应用所提供的第三方服务;
第三网元,用于接收用于注册第三方服务的第二注册请求,并基于第二注册请求对第三方服务进行注册管理,再向第二网元返回注册成功响应;
第二网元,还用于向第一网元返回注册成功响应或注册失败响应;
第一网元,还用于接收第二网元返回的注册成功响应或注册失败响应。
可选的,上述通信系统可以用于注销第三方服务,具体的:
第一网元,用于发送用于注销第三方服务的第一注销请求,第一注销请求中指示有第三方应用所提供的第三方服务;
第二网元,用于接收用于注销第三方服务的第一注销请求并基于第一注销请求对第三方服务进行注销管理;
第二网元,还用于发送用于注销第三方服务的第二注销请求,第二注销请求中指示有第三方应用所提供的第三方服务;
第三网元,用于接收用于注销第三方服务的第二注销请求,并基于第二注销请求对第三方服务进行注销管理,再向第二网元返回注销成功响应;
第二网元,还用于向第一网元返回注销成功响应或注销失败响应;
第一网元,还用于接收第二网元返回的注销成功响应或注销失败响应。
可选的,在本公开的一个实施例之中,上述第二网元2102b,还用于:
接收第一网元发送的用于注册第三方服务的第一注册请求,所述第一注册请求包括所述第三方服务的注册信息;
所述注册信息包括以下至少一种:
第三方服务对应的网络功能NF的标识ID;
第三方服务对应的NF类型;
第三方服务对应的NF支持业务;
第三方应用对应的公共陆地移动网PLMN的ID。
可选的,在本公开的一个实施例之中,上述第二网元2102b,还用于:
基于所述第三方服务的注册信息确定所述第三方服务是否满足授权条件;
响应于确定所述第三方服务满足授权条件,存储所述第三方服务对应的NF的ID;
向第三网元发送用于注册第三方服务的第二注册请求,所述第二注册请求包括所述注册信息和第二网元的ID;
接收所述第三网元发送的注册成功响应。
可选的,在本公开的一个实施例之中,上述第二网元2102b,还用于:
向所述第一网元返回注册成功响应。
可选的,在本公开的一个实施例之中,上述第二网元2102b,还用于:
基于所述第三方服务的注册信息确定所述第三方服务是否满足授权条件;
响应于所述第三方服务的注册信息不满足授权条件,确定所述第三方服务注册失败。
可选的,在本公开的一个实施例之中,上述第二网元2102b,还用于:
向所述第一网元返回注册失败响应。
可选的,在本公开的一个实施例之中,上述第二网元2102b,还用于:
接收第一网元发送的用于注销第三方服务的第一注销请求,所述第一注销请求包括所述第三方服务的注销信息;
所述注销信息包括以下至少一种:
第三方服务对应的NF的ID;
第三方应用对应的PLMN的ID。
可选的,在本公开的一个实施例之中,上述第二网元2102b,还用于:
基于所述第三方服务的注销信息确定所述第三方服务是否满足注销条件;
响应于确定所述第三方服务满足注销条件,向第三网元发送用于注销第三方服务的第二注销请求,所述第二注销请求包括所述注销信息;
响应于接收所述第三网元发送的注销成功响应,删除所述第三方服务对应的NF的ID。
可选的,在本公开的一个实施例之中,上述第二网元2102b,还用于:
向所述第一网元返回注销成功响应
可选的,在本公开的一个实施例之中,上述第二网元2102b,还用于:
基于所述第三方服务的注销信息确定所述第三方服务是否满足注销条件;
响应于所述第三方服务的注销信息不满足注销条件,确定所述第三方服务注销失败。
可选的,在本公开的一个实施例之中,上述第二网元2102b,还用于:
向所述第一网元返回注销失败响应。
可选的,在本公开的一个实施例之中,上述第三网元2103b,还用于:
接收第二网元发送的用于注册第三方服务的第二注册请求,所述第二注册请求包括所述第三方服务的注册信息和第二网元的ID;
所述注册信息包括以下至少一种:
第三方服务对应的NF的ID;
第三方服务对应的NF类型;
第三方服务对应的NF支持业务;
第三方应用对应的PLMN的ID。
可选的,在本公开的一个实施例之中,上述第三网元2103b,还用于:
基于所述第三方服务的注册信息和第二网元的ID为所述第三方服务注册生成对应的配置文件;
将所述第三方服务对应的可用状态设置为可用。
可选的,在本公开的一个实施例之中,上述第三网元2103b,还用于:
向所述第二网元返回注册成功响应。
可选的,在本公开的一个实施例之中,上述第三网元2103b,还用于:
向特定NF网元发送第一通知消息;所述特定NF网元为订阅了服务变更事件的网元,所述第一通知消息用于指示所述第三方服务已完成注册。
可选的,在本公开的一个实施例之中,上述第三网元2103b,还用于:
接收第二网元发送的用于注销第三方服务的第二注销请求,所述第二注销请求包括所述第三方服务的注销信息;
所述注销信息包括以下至少一种:
第三方服务对应的NF的ID;
第三方应用对应的PLMN的ID。
可选的,在本公开的一个实施例之中,上述第三网元2103b,还用于:
基于所述第三方服务对应的注销信息删除所述第三方服务对应的配置文件;
将所述第三方服务的可用状态设置为不可用。
可选的,在本公开的一个实施例之中,上述第三网元2103b,还用于:
向所述第二网元返回注销成功响应。
可选的,在本公开的一个实施例之中,上述第三网元2103b,还用于:
向特定NF网元发送第二通知消息;所述特定NF网元为订阅了服务变更事件的网元,所述第二通知消息用于指示所述第三方服务已完成注销。
可选的,在本公开的一个实施例之中,上述第一网元2101b,还用于:
向所述第二网元发送用于注册第三方服务的第一注册请求,所述第一注册请求包括所述第三方服务的注册信息;
所述注册信息包括以下至少一种:
第三方服务对应的NF的ID;
第三方服务对应的NF类型;
第三方服务对应的NF支持业务;
第三方应用对应的PLMN的ID。
可选的,在本公开的一个实施例之中,上述第一网元2101b,还用于:
接收所述第二网元返回的注册成功响应。
可选的,在本公开的一个实施例之中,上述第一网元2101b,还用于:
接收所述第二网元返回的注册失败响应。
可选的,在本公开的一个实施例之中,上述第一网元2101b,还用于:
向第二网元发送用于注册第三方服务的第一注销请求,所述第一注销请求包括所述第三方服务的注销信息;
所述注销信息包括以下至少一种:
第三方服务对应的NF的ID;
第三方应用对应的PLMN的ID。
可选的,在本公开的一个实施例之中,上述第一网元2101b,还用于:
接收所述第二网元返回的注销成功响应。
可选的,在本公开的一个实施例之中,上述第一网元2101b,还用于:
接收所述第二网元返回的注销失败响应。
请参见图22,图22是本申请实施例提供的一种通信装置2200的结构示意图。通信装置2200可以是网络设备,也可以是终端设备,也可以是支持网络设备实现上述方法的芯片、芯片系统、或处理器等,还可以是支持终端设备实现上述方法的芯片、芯片系统、或处理器等。该装置可用于实现上述方法实施例中描述的方法,具体可以参见上述方法实施例中的说明。
通信装置2200可以包括一个或多个处理器2201。处理器2201可以是通用处理器或者专用处理器等。例如可以是基带处理器或中央处理器。基带处理器可以用于对通信协议以及通信数据进行处理,中央处理器可以用于对通信装置(如,基站、基带芯片,终端设备、终端设备芯片,DU或CU等)进行控制,执行计算机程序,处理计算机程序的数据。
可选的,通信装置2200中还可以包括一个或多个存储器2202,其上可以存有计算机程序2204,处理器2201执行所述计算机程序2204,以使得通信装置2200执行上述方法实施例中描述的方法。可选的,所述存储器2202中还可以存储有数据。通信装置2200和存储器2202可以单独设置,也可以集成在一起。
可选的,通信装置2200还可以包括收发器2205、天线2206。收发器2205可以称为收发单元、收发机、或收发电路等,用于实现收发功能。收发器2205可以包括接收器和发送器,接收器可以称为接收机或接收电路等,用于实现接收功能;发送器可以称为发送机或发送电路等,用于实现发送功能。
可选的,通信装置2200中还可以包括一个或多个接口电路2207。接口电路2207用于接收代码指令并传输至处理器2201。处理器2201运行所述代码指令以使通信装置2200执行上述方法实施例中描述的方法。
通信装置2200为NEF网元:收发器2205用于执行图2中的步骤201、步骤203;图3中的步骤301、步骤304至步骤306;图4中的步骤401、步骤404;图5中的步骤501、步骤503至步骤505;图6中的步骤601、步骤604。处理器2201用于执行图2中的步骤202;图3中的步骤302至步骤303;图4中的步骤402至步骤403;图5中的步骤502;图6中的步骤602至步骤603。
通信装置2200为NRF网元:收发器2205用于执行图7中的步骤701、步骤703;图8中的步骤801、步骤803;图9中的步骤901、步骤903;图10中的步骤1001、步骤1003;图11中的步骤1101、步骤1103。处理器2201用于执行图7中的步骤702;图8中的步骤802;图9中的步骤902;图10中的步骤1002;图11中的步骤1102。
通信装置2200为AF网元:收发器2205用于执行图12中的步骤1201至步骤1202;图13中的步骤1301至步骤1302;图14中的步骤1401至步骤1402;图15中的步骤1501至步骤1502;图16中的步骤1601至步骤1602。处理器2201用于执行图5中的步骤504。
在一种实现方式中,处理器2201中可以包括用于实现接收和发送功能的收发器。例如该收发器可以是收发电路,或者是接口,或者是接口电路。用于实现接收和发送功能的收发电路、接口或接口电路可以是分开的,也可以集成在一起。上述收发电路、接口或接口电路可以用于代码/数据的读写,或者,上述收发电路、接口或接口电路可以用于信号的传输或传递。
在一种实现方式中,处理器2201可以存有计算机程序2203,计算机程序2203在处理器2201上运行,可使得通信装置2200执行上述方法实施例中描述的方法。计算机程序2203可能固化在处理器2201中,该种情况下,处理器2201可能由硬件实现。
在一种实现方式中,通信装置2200可以包括电路,所述电路可以实现前述方法实施例中发送或接收或者通信的功能。本申请中描述的处理器和收发器可实现在集成电路(integrated circuit,IC)、模拟IC、射频集成电路RFIC、混合信号IC、专用集成电路(application specific integrated circuit,ASIC)、印刷电路板(printed circuit board,PCB)、电子设备等上。该处理器和收发器也可以用各种IC工艺技术来制造,例如互补金属氧化物半导体(complementary metal oxide semiconductor,CMOS)、N型金属氧化物半导体(nMetal-oxide-semiconductor,NMOS)、P型金属氧化物半导体(positive channel metal  oxide semiconductor,PMOS)、双极结型晶体管(bipolar junction transistor,BJT)、双极CMOS(BiCMOS)、硅锗(SiGe)、砷化镓(GaAs)等。
以上实施例描述中的通信装置可以是网络设备或者终端设备,但本申请中描述的通信装置的范围并不限于此,而且通信装置的结构可以不受图22的限制。通信装置可以是独立的设备或者可以是较大设备的一部分。例如所述通信装置可以是:
(1)独立的集成电路IC,或芯片,或,芯片系统或子系统;
(2)具有一个或多个IC的集合,可选的,该IC集合也可以包括用于存储数据,计算机程序的存储部件;
(3)ASIC,例如调制解调器(Modem);
(4)可嵌入在其他设备内的模块;
(5)接收机、终端设备、智能终端设备、蜂窝电话、无线设备、手持机、移动单元、车载设备、网络设备、云设备、人工智能设备等等;
(6)其他等等。
对于通信装置可以是芯片或芯片系统的情况,可参见图23所示的芯片的结构示意图。图23所示的芯片包括处理器2301和接口2302。其中,处理器2301的数量可以是一个或多个,接口2302的数量可以是多个。
可选的,芯片还包括存储器2303,存储器2303用于存储必要的计算机程序和数据。
本领域技术人员还可以了解到本申请实施例列出的各种说明性逻辑块(illustrative logical block)和步骤(step)可以通过电子硬件、电脑软件,或两者的结合进行实现。这样的功能是通过硬件还是软件来实现取决于特定的应用和整个系统的设计要求。本领域技术人员可以对于每种特定的应用,可以使用各种方法实现所述的功能,但这种实现不应被理解为超出本申请实施例保护的范围。
本申请还提供一种可读存储介质,其上存储有指令,该指令被计算机执行时实现上述任一方法实施例的功能。
本申请还提供一种计算机程序产品,该计算机程序产品被计算机执行时实现上述任一方法实施例的功能。
在上述实施例中,可以全部或部分地通过软件、硬件、固件或者其任意组合来实现。当使用软件实现时,可以全部或部分地以计算机程序产品的形式实现。所述计算机程序产品包括一个或多个计算机程序。在计算机上加载和执行所述计算机程序时,全部或部分地产生按照本申请实施例所述的流程或功能。所述计算机可以是通用计算机、专用计算机、计算机网络、或者其他可编程装置。所述计算机程序可以存储在计算机可读存储介质中,或者从一个计算机可读存储介质向另一个计算机可读存储介质传输,例如,所述计算机程序可以从一个网站站点、计算机、服务器或数据中心通过有线(例如同轴电缆、光纤、数字用户线(digital subscriber line,DSL))或无线(例如红外、无线、微波等)方式向另一个网站站点、计算机、服务器或数据中心进行传输。所述计算机可读存储介质可以是计算机能够存取的任何可用介质或者是包含一个或多个可用介质集成的服务器、数据中心等数据存储设备。所述可用介质可以是磁性介质(例如,软盘、硬盘、磁带)、光介质(例如,高密度数字视频光盘(digital video disc,DVD))、或者半导体介质(例如,固态硬盘(solid state disk,SSD))等。
本领域普通技术人员可以理解:本申请中涉及的第一、第二等各种数字编号仅为描述方便进行的区分,并不用来限制本申请实施例的范围,也表示先后顺序。
本申请中的至少一个还可以描述为一个或多个,多个可以是两个、三个、四个或者更多个,本申请不做限制。在本申请实施例中,对于一种技术特征,通过“第一”、“第二”、“第三”、“A”、“B”、“C”和“D”等区分该种技术特征中的技术特征,该“第一”、“第二”、“第三”、“A”、“B”、“C”和“D”描述的技术特征间无先后顺序或者大小顺序。
本申请中各表所示的对应关系可以被配置,也可以是预定义的。各表中的信息的取值仅仅是举例,可以配置为其他值,本申请并不限定。在配置信息与各参数的对应关系时,并不一定要求必须配置各表中示意出的所有对应关系。例如,本申请中的表格中,某些行示出的对应关系也可以不配置。又例如, 可以基于上述表格做适当的变形调整,例如,拆分,合并等等。上述各表中标题示出参数的名称也可以采用通信装置可理解的其他名称,其参数的取值或表示方式也可以通信装置可理解的其他取值或表示方式。上述各表在实现时,也可以采用其他的数据结构,例如可以采用数组、队列、容器、栈、线性表、指针、链表、树、图、结构体、类、堆、散列表或哈希表等。
本申请中的预定义可以理解为定义、预先定义、存储、预存储、预协商、预配置、固化、或预烧制。
本领域普通技术人员可以意识到,结合本文中所公开的实施例描述的各示例的单元及算法步骤,能够以电子硬件、或者计算机软件和电子硬件的结合来实现。这些功能究竟以硬件还是软件方式来执行,取决于技术方案的特定应用和设计约束条件。专业技术人员可以对每个特定的应用来使用不同方法来实现所描述的功能,但是这种实现不应认为超出本申请的范围。
所属领域的技术人员可以清楚地了解到,为描述的方便和简洁,上述描述的系统、装置和单元的具体工作过程,可以参考前述方法实施例中的对应过程,在此不再赘述。
以上所述,仅为本申请的具体实施方式,但本申请的保护范围并不局限于此,任何熟悉本技术领域的技术人员在本申请揭露的技术范围内,可轻易想到变化或替换,都应涵盖在本申请的保护范围之内。因此,本申请的保护范围应以所述权利要求的保护范围为准。

Claims (34)

  1. 一种第三方服务管理方法,其特征在于,被网络开放功能NEF网元执行,包括:
    接收应用功能AF网元发送的用于管理第三方服务的第一管理请求,所述第一管理请求中指示有第三方应用所提供的第三方服务;
    基于所述第一管理请求对所述第三方服务进行管理;
    向所述AF网元返回管理结果。
  2. 如权利要求1所述的方法,其特征在于,所述接收AF网元发送的用于管理第三方服务的第一管理请求,包括:
    接收AF网元发送的用于注册第三方服务的第一注册请求,所述第一注册请求包括所述第三方服务的注册信息;
    所述注册信息包括以下至少一种:
    第三方服务对应的网络功能NF的标识ID;
    第三方服务对应的NF类型;
    第三方服务对应的NF支持业务;
    第三方应用对应的公共陆地移动网PLMN的ID。
  3. 如权利要求2所述的方法,其特征在于,所述基于所述第一管理请求对所述第三方服务进行管理,包括:
    基于所述第三方服务的注册信息确定所述第三方服务是否满足授权条件;
    响应于确定所述第三方服务满足授权条件,存储所述第三方服务对应的NF的ID;
    向网络存储功能NRF网元发送用于注册第三方服务的第二注册请求,所述第二注册请求包括所述注册信息和NEF ID;
    接收所述NRF网元发送的注册成功响应。
  4. 如权利要求3所述的方法,其特征在于,所述向所述AF网元返回管理结果,包括:
    向所述AF网元返回注册成功响应。
  5. 如权利要求2所述的方法,其特征在于,所述基于所述第一管理请求对所述第三方服务进行管理,包括:
    基于所述第三方服务的注册信息确定所述第三方服务是否满足授权条件;
    响应于所述第三方服务的注册信息不满足授权条件,确定所述第三方服务注册失败。
  6. 如权利要求5所述的方法,其特征在于,所述向所述AF网元返回管理结果,包括:
    向所述AF网元返回注册失败响应。
  7. 如权利要求1所述的方法,其特征在于,所述接收AF网元发送的用于管理第三方服务的第一管理请求,包括:
    接收AF网元发送的用于注销第三方服务的第一注销请求,所述第一注销请求包括所述第三方服务的注销信息;
    所述注销信息包括以下至少一种:
    第三方服务对应的NF的ID;
    第三方应用对应的PLMN的ID。
  8. 如权利要求7所述的方法,其特征在于,所述基于所述第一管理请求对所述第三方服务进行管 理,包括:
    基于所述第三方服务的注销信息确定所述第三方服务是否满足注销条件;
    响应于确定所述第三方服务满足注销条件,向NRF网元发送用于注销第三方服务的第二注销请求,所述第二注销请求包括所述注销信息;
    响应于接收所述NRF网元发送的注销成功响应,删除所述第三方服务对应的NF的ID。
  9. 如权利要求8所述的方法,其特征在于,所述向所述AF网元返回管理结果,包括:
    向所述AF网元返回注销成功响应。
  10. 如权利要求7所述的方法,其特征在于,所述基于所述第一管理请求对所述第三方服务进行管理,包括:
    基于所述第三方服务的注销信息确定所述第三方服务是否满足注销条件;
    响应于所述第三方服务的注销信息不满足注销条件,确定所述第三方服务注销失败。
  11. 如权利要求10所述的方法,其特征在于,所述向所述AF网元返回管理结果,包括:
    向所述AF网元返回注销失败响应。
  12. 一种第三方服务管理方法,其特征在于,被NRF网元执行,包括:
    接收NEF网元发送的用于管理第三方服务的第二管理请求,所述第二管理请求中指示有第三方应用所提供的第三方服务;
    基于所述第二管理请求对所述第三方服务进行管理;
    向所述NEF网元返回管理结果。
  13. 如权利要求12所述的方法,其特征在于,所述接收NEF网元发送的用于管理第三方服务的第二管理请求,包括:
    接收NEF网元发送的用于注册第三方服务的第二注册请求,所述第二注册请求包括所述第三方服务的注册信息和NEF ID;
    所述注册信息包括以下至少一种:
    第三方服务对应的NF的ID;
    第三方服务对应的NF类型;
    第三方服务对应的NF支持业务;
    第三方应用对应的PLMN的ID。
  14. 如权利要求13所述的方法,其特征在于,所述基于所述第二管理请求对所述第三方服务进行管理,包括以下至少一种:
    基于所述第三方服务的注册信息和NEF ID为所述第三方服务注册生成对应的配置文件;
    将所述第三方服务对应的可用状态设置为可用。
  15. 如权利要求14所述的方法,其特征在于,所述向所述NEF网元返回管理结果,包括:
    向所述NEF网元返回注册成功响应。
  16. 如权利要求14所述的方法,其特征在于,所述方法还包括:
    向特定NF网元发送第一通知消息;所述特定NF网元为订阅了服务变更事件的网元,所述第一通知消息用于指示所述第三方服务已完成注册。
  17. 如权利要求12所述的方法,其特征在于,所述接收NEF网元发送的用于管理第三方服务的第二管理请求,包括:
    接收NEF网元发送的用于注销第三方服务的第二注销请求,所述第二注销请求包括所述第三方服务的注销信息;
    所述注销信息包括以下至少一种:
    第三方服务对应的NF的ID;
    第三方应用对应的PLMN的ID。
  18. 如权利要求17所述的方法,其特征在于,所述基于所述第二服务管理请求对所述第三方服务进行管理,包括以下至少一种:
    基于所述第三方服务对应的注销信息删除所述第三方服务对应的配置文件;
    将所述第三方服务的可用状态设置为不可用。
  19. 如权利要求18所述的方法,其特征在于,所述向所述NEF网元返回管理结果,包括:向所述NEF网元返回注销成功响应。
  20. 如权利要求18所述的方法,其特征在于,所述方法还包括:
    向特定NF网元发送第二通知消息;所述特定NF网元为订阅了服务变更事件的网元,所述第二通知消息用于指示所述第三方服务已完成注销。
  21. 一种第三方服务管理方法,其特征在于,被AF网元执行,包括:
    向NEF网元发送用于管理第三方服务的第一管理请求,所述第一管理请求中指示有第三方应用所提供的第三方服务;
    接收所述NEF网元返回的管理结果。
  22. 如权利要求21所述的方法,其特征在于,所述向NEF网元发送用于管理第三方服务的第一管理请求,包括:向所述NEF网元发送用于注册第三方服务的第一注册请求,所述第一注册请求包括所述第三方服务的注册信息;
    所述注册信息包括以下至少一种:
    第三方服务对应的NF的ID;
    第三方服务对应的NF类型;
    第三方服务对应的NF支持业务;
    第三方应用对应的PLMN的ID。
  23. 如权利要求22所述的方法,其特征在于,所述接收所述NEF网元返回的管理结果,包括:接收所述NEF网元返回的注册成功响应。
  24. 如权利要求22所述的方法,其特征在于,所述接收所述NEF网元返回的管理结果,包括:接收所述NEF网元返回的注册失败响应。
  25. 如权利要求21所述的方法,其特征在于,所述向NEF网元发送用于管理第三方服务的第一管理请求,包括:向NEF网元发送用于注册第三方服务的第一注销请求,所述第一注销请求包括所述第三方服务的注销信息;
    所述注销信息包括以下至少一种:
    第三方服务对应的NF的ID;
    第三方应用对应的PLMN的ID。
  26. 如权利要求25所述的方法,其特征在于,所述接收所述NEF网元返回的管理结果,包括:接收所述NEF网元返回的注销成功响应。
  27. 如权利要求25所述的方法,其特征在于,所述接收所述NEF网元返回的管理结果,包括:接收所述NEF网元返回的注销失败响应。
  28. 一种通信装置,被配置在NEF网元,包括:
    收发模块,用于接收应用功能AF网元发送的用于管理第三方服务的第一管理请求,所述第一管理请求中指示有第三方应用所提供的第三方服务;
    管理模块,用于基于所述第一管理请求对所述第三方服务进行管理;
    所述收发模,还用于块向所述AF网元返回管理结果。
  29. 一种通信装置,被配置在NRF网元中,包括:
    收发模块,用于接收NEF网元发送的用于管理第三方服务的第二管理请求,所述第二管理请求中指示有第三方应用所提供的第三方服务;
    管理模块,用于基于所述第二管理请求对所述第三方服务进行管理;
    收发模块,还用于向所述NEF网元返回管理结果。
  30. 一种通信装置,被配置在AF网元中,包括:
    收发模块,用于向NEF网元发送用于管理第三方服务的第一管理请求,所述第一管理请求中指示有第三方应用所提供的第三方服务;
    所述收发模块,还用于接收所述NEF网元返回的管理结果。
  31. 一种通信系统,其特征在于,所述系统包括:
    第一网元,用于发送用于管理第三方服务的第一管理请求,所述第一管理请求中指示有第三方应用所提供的第三方服务;
    第二网元,用于接收所述用于管理第三方服务的第一管理请求并基于所述第一管理请求对所述第三方服务进行管理;
    所述第二网元,还用于发送用于管理第三方服务的第二管理请求,所述第二管理请求中指示有第三方应用所提供的第三方服务;
    第三网元,用于接收所述用于管理第三方服务的第二管理请求,并基于所述第二管理请求对所述第三方服务进行管理,再向所述第二网元返回管理结果;
    所述第二网元,还用于向所述第一网元返回管理结果;
    所述第一网元,还用于接收所述第二网元返回的管理结果。
  32. 一种通信装置,其特征在于,所述装置包括处理器和存储器,其中,所述存储器中存储有计算机程序,所述处理器执行所述存储器中存储的计算机程序,以使所述装置执行如权利要求1至11中任一项所述的方法,或所述处理器执行所述存储器中存储的计算机程序,以使所述装置执行如权利要求12至20中任一项所述的方法,或所述处理器执行所述存储器中存储的计算机程序,以使所述装置执行如权利要求21至27中任一项所述的方法。
  33. 一种通信装置,其特征在于,包括:处理器和接口电路,其中
    所述接口电路,用于接收代码指令并传输至所述处理器;
    所述处理器,用于运行所述代码指令以执行如权利要求1至11中任一项所述的方法,或用于运行所述代码指令以执行如权利要求12至20中任一项所述的方法,或用于运行所述代码指令以执行如权利要求21至27中任一项所述的方法。
  34. 一种计算机可读存储介质,用于存储有指令,当所述指令被执行时,使如权利要求1至11中任一项所述的方法被实现,或当所述指令被执行时,使如权利要求12至20中任一项所述的方法被实现,或当所述指令被执行时,使如权利要求21至27中任一项所述的方法被实现。
PCT/CN2022/107714 2022-07-25 2022-07-25 一种第三方服务管理方法/装置/设备及存储介质 WO2024020751A1 (zh)

Priority Applications (1)

Application Number Priority Date Filing Date Title
PCT/CN2022/107714 WO2024020751A1 (zh) 2022-07-25 2022-07-25 一种第三方服务管理方法/装置/设备及存储介质

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/CN2022/107714 WO2024020751A1 (zh) 2022-07-25 2022-07-25 一种第三方服务管理方法/装置/设备及存储介质

Publications (1)

Publication Number Publication Date
WO2024020751A1 true WO2024020751A1 (zh) 2024-02-01

Family

ID=89704879

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2022/107714 WO2024020751A1 (zh) 2022-07-25 2022-07-25 一种第三方服务管理方法/装置/设备及存储介质

Country Status (1)

Country Link
WO (1) WO2024020751A1 (zh)

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20180270778A1 (en) * 2017-03-17 2018-09-20 Samsung Electronics Co., Ltd. Af influenced pdu session management and subscription procedures
CN109981316A (zh) * 2017-12-27 2019-07-05 华为技术有限公司 应用服务器的切换方法及会话管理网元、终端设备
CN113424608A (zh) * 2019-02-18 2021-09-21 华为技术有限公司 用于为网络提供外部服务的实体
US20210377896A1 (en) * 2019-02-18 2021-12-02 Huawei Technologies Co., Ltd. Entities for providing an external service to a network
CN114765754A (zh) * 2021-01-14 2022-07-19 中国移动通信有限公司研究院 无线服务开放方法及第一执行主体

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20180270778A1 (en) * 2017-03-17 2018-09-20 Samsung Electronics Co., Ltd. Af influenced pdu session management and subscription procedures
CN109981316A (zh) * 2017-12-27 2019-07-05 华为技术有限公司 应用服务器的切换方法及会话管理网元、终端设备
CN113424608A (zh) * 2019-02-18 2021-09-21 华为技术有限公司 用于为网络提供外部服务的实体
US20210377896A1 (en) * 2019-02-18 2021-12-02 Huawei Technologies Co., Ltd. Entities for providing an external service to a network
CN114765754A (zh) * 2021-01-14 2022-07-19 中国移动通信有限公司研究院 无线服务开放方法及第一执行主体

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
SAMSUNG: "Solution update: NIDD service activation for AMF and SMF", 3GPP DRAFT; S2-187188 WAS 6887 REV OF 5033 NIDD SERVICE ACTIVATION, 3RD GENERATION PARTNERSHIP PROJECT (3GPP), MOBILE COMPETENCE CENTRE ; 650, ROUTE DES LUCIOLES ; F-06921 SOPHIA-ANTIPOLIS CEDEX ; FRANCE, vol. SA WG2, no. Vilnius, Lithuania; 20180702 - 20180706, 5 July 2018 (2018-07-05), Mobile Competence Centre ; 650, route des Lucioles ; F-06921 Sophia-Antipolis Cedex ; France , XP051470213 *

Similar Documents

Publication Publication Date Title
WO2023184457A1 (zh) 生效时间确定方法及装置
WO2024077455A1 (zh) 一种非陆地网络的接入方法及装置
WO2024020751A1 (zh) 一种第三方服务管理方法/装置/设备及存储介质
WO2023201754A1 (zh) 一种终端设备的移动性管理方法及装置
WO2023201756A1 (zh) 一种用于基于条件的移动性的信息的处理方法及装置
WO2024026890A1 (zh) 一种定位方法/装置/设备及存储介质
WO2024050778A1 (zh) 一种人工智能服务策略的更新方法及装置
WO2023184191A1 (zh) 一种扩展现实多媒体xrm业务的处理方法及其装置
WO2024026697A1 (zh) 一种卫星终端接入移动网络的方法及其装置
WO2024026888A1 (zh) 一种应用功能的应用方法及装置
WO2023245452A1 (zh) 一种系统信息配置方法/装置/设备及存储介质
CN114830606A (zh) 组播通信方法及其装置
WO2024098219A1 (zh) 一种密钥分发方法、装置、设备及存储介质
WO2023236123A1 (zh) 一种系统消息传输方法/装置/设备及存储介质
WO2024082233A1 (zh) 移动性限制实现方法和装置
WO2024045042A1 (zh) 一种能力交互触发方法/装置/设备及存储介质
WO2024020752A1 (zh) 一种基于人工智能ai提供服务的方法、装置、设备及存储介质
WO2023115487A1 (zh) 一种人工智能会话的创建方法及其装置
WO2023087191A1 (zh) 无线资源控制rrc拒绝消息的传输方法及装置
WO2023240419A1 (zh) 一种接入控制的方法及装置
WO2023173257A1 (zh) 一种请求系统信息的方法及其装置
WO2023201755A1 (zh) 一种移动性管理的配置方法及装置
WO2023115279A1 (zh) 数据传输方法及装置
WO2024065564A1 (zh) 一种api的调用方法、装置、设备及存储介质
WO2024065705A1 (zh) 应用功能授权方法及装置

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 22952218

Country of ref document: EP

Kind code of ref document: A1