WO2024208302A1 - Information interaction method and apparatus, and device and storage medium - Google Patents
Information interaction method and apparatus, and device and storage medium Download PDFInfo
- Publication number
- WO2024208302A1 WO2024208302A1 PCT/CN2024/085941 CN2024085941W WO2024208302A1 WO 2024208302 A1 WO2024208302 A1 WO 2024208302A1 CN 2024085941 W CN2024085941 W CN 2024085941W WO 2024208302 A1 WO2024208302 A1 WO 2024208302A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- network function
- information
- tunnel
- network
- channel
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W76/00—Connection management
- H04W76/10—Connection setup
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/06—Authentication
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/08—Access security
Definitions
- the present application relates to the field of wireless communication technology, and in particular to an information interaction method, device, equipment and storage medium.
- NEF network open function
- AF application function
- API application program interface
- CAPIF Common API Framework for 3GPP Northbound APIs
- the present application provides an information interaction method, the method comprising:
- the terminal accesses the second network function through the first network function.
- the first network function includes one of the following: AF, user plane function (UPF), access and mobility management function (AMF); the second network function is NEF.
- AF user plane function
- AMF access and mobility management function
- the terminal accesses the second network function through the first network function, including:
- the first information is used by the terminal to request the second network function to authorize access;
- the first information includes at least one of the following:
- S-NSSAI Single Network Slice Selection Assistance Information
- IP Internet Protocol
- the terminal accesses the second network function through the first network function, including:
- the second network function is accessed.
- the terminal accesses the second network function through the first network function, including:
- the second network function is accessed.
- the second information pre-configured locally is pre-configured on the first network function through interaction between the first network function and the second network function.
- Radio Access Network RAN
- the first network function responds to the third request, accesses the second network function through the N6 interface bypassing the multi-access edge computing (MEC) data network (DN, Data Network), or accesses the second network function through a user plane tunnel between the first network function and the second network function.
- MEC multi-access edge computing
- the first network function is UPF
- the second network function is NEF
- the terminal accesses the second network function through the first network function, including:
- NAS non-access stratum
- the first network function updates the context on the third network function by calling a service interface provided by the third network function; the third network function sends a fourth request to the second network function to access the second network function; and the fourth request carries third information.
- the first network function is an access and mobility management function AMF
- the second network function is NEF
- the third network function is SMF.
- the method further includes:
- the terminal receives fourth information returned by the second network function
- the fourth information is determined by the second network function based on the third information,
- the fourth information represents authentication information of the terminal authenticating the second network function to access the second network function.
- the third information includes at least one of the following:
- UE ID User identification
- Protocol Data Unit (PDU) session ID
- At least one embodiment of the present application provides an information interaction method, the method comprising:
- the fourth network function receives fifth information sent by the fifth network function.
- the fifth information includes:
- the data packet information transmitted in the tunnel or channel is an IP triplet
- the IP triplet includes:
- the IP address of the local server is the IP address of the local server
- the IP address of the core server is the IP address of the core server
- the DNAI is one or more.
- the method further includes:
- the fourth network function generates sixth information according to the fifth information and/or the local network policy, and sends the sixth information to the sixth network function.
- the local network policy is an operator configuration policy and/or subscription data; and the sixth information is a network policy.
- the method further includes:
- the sixth network function selects a suitable UPF according to the DNAI information in the sixth information, and Configure the corresponding packet processing instructions.
- the UPF is a local PDU session anchor (PSA) UPF, and/or an uplink classifier (UL CL) UPF, and/or a core PSA UPF.
- PSA PDU session anchor
- UL CL uplink classifier
- the sixth network function is SMF.
- the fourth network function is a PCF; and the fifth network function is an application or an application server or a service or a local application.
- At least one embodiment of the present application provides an information interaction method, the method comprising:
- the seventh network function receives the seventh information sent by the eighth network function.
- the seventh information is downlink data sent by the core server to the eighth network function
- the eighth network function forwards the downlink data sent from the core server to a tunnel or channel according to the data packet processing instruction, and sends it to the seventh network function.
- the packet processing indication is information of the SMF configuration received by the eighth network function.
- the tunnel or channel is a tunnel or channel for transmitting data between the eighth network function and the seventh network function;
- the establishment of the tunnel or channel is generated based on the local network configuration.
- the seventh network function forwards the downlink data sent from the eighth network function to a tunnel or channel according to the data packet processing instruction, and sends it to the ninth network function.
- the ninth network function is a local PSA UPF.
- the tunnel or channel is a tunnel or channel for transmitting data between the eighth network function and the ninth network function.
- the packet processing indication is information of the SMF configuration received by the seventh network function.
- the forwarding of the downlink data between the eighth network function and the core server relies on the N6 tunnel.
- the establishment of the N6 tunnel is generated by relying on local network configuration.
- the seventh network function is UL CL UPF or I-UPF; the eighth network function is the core PSA UPF.
- At least one embodiment of the present application provides an information interaction method, the method comprising:
- the tenth network function receives the eighth information sent by the eleventh network function.
- the eighth information is downlink data sent by the local server to the eleventh network function
- the eleventh network function forwards the downlink data sent from the local server to a tunnel or channel according to the data packet processing instruction, and sends it to the tenth network function.
- the packet processing indication is information of the SMF configuration received by the eleventh network function.
- the tunnel or channel is a tunnel or channel for transmitting data between the eleventh network function and the tenth network function
- the establishment of the tunnel or channel is generated based on the local network configuration.
- the tenth network function forwards the downlink data sent from the eleventh network function to a tunnel or channel according to the data packet processing instruction, and sends it to the twelfth network function.
- the twelfth network function is a core PSA UPF.
- the tunnel or channel is a tunnel or channel for transmitting data between the eleventh network function and the twelfth network function.
- the packet processing indication is information of the SMF configuration received by the tenth network function.
- the forwarding of the downlink data between the eleventh network function and the local server relies on the N6 tunnel.
- the establishment of the N6 tunnel is generated by relying on local network configuration.
- the tenth network function is UL CL UPF or I-UPF; the eleventh network function is a local PSA UPF.
- At least one embodiment of the present application provides an information interaction method, the method comprising:
- the thirteenth network function receives the ninth information sent by the fourteenth network function.
- the fourteenth network function forwards the downlink data sent from the core server to a tunnel or channel according to the packet processing instruction, and sends it to the thirteenth network function.
- the packet processing indication is information of the SMF configuration received by the fourteenth network function.
- the tunnel or channel is a tunnel or channel for transmitting data between the fourteenth network function and the thirteenth network function;
- the establishment of the tunnel or channel is generated based on the local network configuration.
- the forwarding of the downlink data between the fourteenth network function and the core server relies on the N6 tunnel.
- the establishment of the N6 tunnel is generated by relying on local network configuration.
- the thirteenth network function is a local PSA UPF; the fourteenth network function is a core PSA UPF.
- At least one embodiment of the present application provides an information interaction method, the method comprising:
- the fifteenth network function receives the tenth information sent by the sixteenth network function.
- the tenth information is downlink data sent by the core server to the sixteenth network function
- the sixteenth network function forwards the downlink data sent from the local server to a tunnel or channel according to the data packet processing instruction, and sends it to the fifteenth network function.
- the packet processing indication is information of the SMF configuration received by the sixteenth network function.
- forwarding of the downlink data between the sixteenth network function and the local server relies on the N6 tunnel.
- At least one embodiment of the present application provides an information interaction device, including:
- At least one embodiment of the present application provides an information interaction device, including:
- the first receiving unit is configured to receive fifth information sent by a fifth network function.
- At least one embodiment of the present application provides an information interaction device, including:
- the second receiving unit is used to receive seventh information sent by the eighth network function.
- At least one embodiment of the present application provides an information interaction device, including:
- the third receiving unit is used to receive the eighth information sent by the eleventh network function.
- At least one embodiment of the present application provides an information interaction device, including:
- the fourth receiving unit is used to receive ninth information sent by the fourteenth network function.
- At least one embodiment of the present application provides an information interaction device, including:
- the fifth receiving unit is used to receive the tenth information sent by the sixteenth network function.
- At least one embodiment of the present application provides a terminal, including a processor and a memory for storing a computer program that can be run on the processor.
- the processor when used to run the computer program, it executes the steps of any one of the methods described above on the terminal side.
- At least one embodiment of the present application provides a network device, including a processor and a memory for storing a computer program that can be run on the processor.
- the processor when used to run the computer program, it executes the steps of any one of the methods described above on the network device side.
- the terminal accesses the second network function through the first network function.
- the terminal accesses the second network function through the first network function, so that the second network function provides services to the terminal.
- the embodiments of the present application can realize and improve the call of the second network function service by the terminal.
- FIG1 is a schematic diagram of a first implementation flow of an information interaction method according to an embodiment of the present application.
- FIG2 is a schematic diagram of a specific implementation flow of the information interaction method according to an embodiment of the present application.
- FIG3 is a second schematic diagram of a specific implementation flow of the information interaction method according to an embodiment of the present application.
- FIG4 is a schematic diagram of a third specific implementation flow of the information interaction method according to an embodiment of the present application.
- FIG5 is a schematic diagram of a UE accessing a NEF through a UPF according to an embodiment of the present application
- FIG6 is a schematic diagram of a UE accessing a NEF through an AMF and an SMF according to an embodiment of the present application
- FIG7 is a second schematic diagram of the implementation flow of the information interaction method according to an embodiment of the present application.
- FIG8 is a fourth schematic diagram of a specific implementation flow of the information interaction method according to an embodiment of the present application.
- FIG9 is a schematic diagram of a specific implementation flow of the information interaction method according to an embodiment of the present application.
- FIG10 a is a schematic diagram 1 of a tunnel established in an embodiment of the present application.
- FIG10 b is a second schematic diagram of a tunnel established in an embodiment of the present application.
- FIG11 is a schematic diagram of the first structure of the information interaction device according to an embodiment of the present application.
- FIG12 is a second schematic diagram of the structure of the information interaction device according to an embodiment of the present application.
- FIG13 is a schematic diagram of the structure of a terminal according to an embodiment of the present application.
- FIG. 14 is a schematic diagram of the composition structure of the network device according to an embodiment of the present application.
- NEF Network Exposure
- CAPIF Common API Framework for 3GPP Northbound APIs
- operators and third parties authorize through offline SLA agreements, notify NEF of the third-party application's identity information (such as app ID) in advance, and deploy it on CAPIF.
- an application needs to call NEF services, it needs to carry this authentication information to call CAPIF's information.
- the application provider cannot know the UE's identity information, and it is necessary to study how CAPIF authorizes the UE so that the UE can call NEF services.
- NEF supports authorization of AF access, but not NEF authorization of UE access.
- NEF needs to be able to determine that the request comes from UE and respond accordingly, and on the other hand, it needs to authenticate the identity of UE and authorize authentication.
- the terminal accesses the second network function through the first network function.
- the UE on the end side can directly initiate a service request to the cloud server.
- the AS is not a simple business server, but a proxy server that can process UE service requests. Therefore, the UE can directly access the AS request to call the NEF service.
- the AS can also send relevant information to the PCF through the NEF for the PCF to implement tunnel configuration, etc.
- the fourth network function receives the fifth information sent by the fifth network function.
- FIG. 1 is a schematic diagram of an implementation flow of an information interaction method according to an embodiment of the present application. As shown in FIG. 1 , the method includes step 101:
- Step 101 A terminal accesses a second network function through a first network function.
- the first network function includes one of the following: AF, UPF, AMF; the second network function is NEF.
- the terminal can obtain the first information authorized by the second network function to access the terminal from the first network function, so that the terminal uses the first information to access the second network function.
- the terminal accesses the second network function through the first network function, including:
- the first information is used by the terminal to request the second network function to authorize access;
- the second network function is accessed.
- the first information includes at least one of the following:
- AF can generate first information based on the authentication information in the contract data of the terminal for authenticating the terminal, wherein the authentication information can also be authentication information or authorization, so that the terminal can request authorized access from NEF based on the first information.
- the terminal accesses the second network function through the first network function, including:
- the contract signing data is obtained
- the first information is determined by the first network function based on the subscription data when determining to initiate redirection to the terminal;
- the second network function is accessed.
- the first network function is AF
- the second network function is NEF
- the second information can be pre-configured locally in the AF; the second information represents the UE information authorized to access by the NEF, and the AF generates the first information based on the second information pre-configured locally, so that the terminal can request authorized access from the NEF based on the first information.
- the terminal accesses the second network function through the first network function, including:
- the first information is determined by the first network function based on second information pre-configured locally when determining to initiate redirection to the terminal;
- the second network function is accessed.
- the second information pre-configured locally is pre-configured on the first network function through interaction between the first network function and the second network function.
- the second information represents terminal information that the second network function is authorized to access.
- the first network function is AF
- the second network function is NEF
- the AF interacts with the CAPIF (referring to the NEF) on UE information to determine that the UE can call the interface of the NEF. That is, the AF registers all UE information that has opened accounts on it to the CAPIF, implements the NEF's access authorization to these UEs, and configures the second information locally on the AF.
- the CAPIF referring to the NEF
- the third situation considering that in actual application, when the first network function is UPF and the second network function is NEF, the terminal sends a third request to UPF; the third request carries third information; the third information represents the UE information that can access NEF after AF authentication, UPF accesses NEF based on the third information, NEF returns fourth information to the terminal through UPF, and the terminal accesses NEF using the fourth information returned by NEF; the fourth information represents the authentication information of the terminal to access NEF after being authenticated by NEF.
- the terminal accesses the second network function through the first network function, including:
- the first network function responds to the third request and accesses the second network function through the N6 interface bypassing the MEC DN, or accesses the second network function through a user plane tunnel between the first network function and the second network function.
- the first network function is UPF
- the second network function is NEF
- the terminal may send a service request to the AF; the service request is used to request to call the service of the AF; the AF returns the third information to the terminal; the third information represents the UE information that the AF authenticates and can access the NEF.
- the third information includes at least one of the following:
- the method further comprises:
- the terminal receives fourth information returned by the second network function
- the fourth information is determined by the second network function based on the third information, and the fourth information represents authentication information of the terminal authenticating access to the second network function by the second network function.
- the terminal accesses NEF by transmitting data through signaling.
- the terminal accesses the second network function through the first network function, including:
- the first network function updates the context on the third network function by calling a service interface provided by the third network function; the third network function sends a fourth request to the second network function to access the second network function; and the fourth request carries third information.
- the first network function is AMF
- the second network function is NEF
- the third network function is SMF
- SMF sends a connection establishment request to NEF;
- the connection establishment request carries third information;
- the third information represents the UE information that AF authenticates and can access NEF;
- NEF returns authorization information to the terminal through SMF and AMF, and the terminal accesses NEF based on the authorization information returned by NEF.
- the third information includes at least one of the following:
- the UE can call the NEF service based on redirection.
- FIG. 2 is a schematic diagram of a specific implementation flow of the information interaction method according to an embodiment of the present application. As shown in FIG. 2 , the method includes steps 201 to 204:
- Step 201 During the session establishment process, the terminal (UE) obtains subscription data from the core network (5GC).
- 5GC core network
- the subscription data includes authentication information for authenticating the UE, wherein the authentication information may also be certification information or authorization.
- Step 202 The UE sends a first request to a first network function (AF); the first request is used to request to call a service of the AF; the first request carries the subscription data.
- AF network function
- Step 203 When AF determines that HTTP 302 redirection needs to be triggered, AF sends a redirection notification message to UE; the redirection notification message carries first information; the first information is determined by AF based on the contract data.
- the first information includes at least one of the following:
- Step 204 The UE sends a service invocation request to a second network function (NEF) based on the first information.
- NEF network function
- the UE sends a service call request to the NEF to request to call the NEF's service, and the service may be to retrieve the UE ID.
- the service call request may carry the authentication information and user information obtained in step 201; wherein the user information may be the UE's IPv6 address, etc.
- the UE obtains the subscription data through 5GC, and uses the first information returned by the AF and determined based on the subscription data to request to call the NEF service.
- FIG3 is a schematic diagram of a specific implementation flow of the information interaction method according to an embodiment of the present application. As shown in FIG3 , the method includes steps 301 to 304:
- Step 301 Pre-configure second information locally on the AF through interaction between the first network function (AF) and the second network function (NEF); the second information represents information of the terminal (UE) that the NEF is authorized to access.
- AF first network function
- NEF second network function
- the AF interacts with the CAPIF (referring to the NEF) on UE information to determine that the UE can call the interface of the NEF. That is, the AF registers all UE information that has opened accounts on it to the CAPIF, implements the NEF's access authorization to these UEs, and configures the second information locally on the AF.
- the CAPIF referring to the NEF
- the second information includes:
- NEF Uniform Resource Identifier
- Step 302 The UE sends a second request to the AF; the second request is used to request a service from the AF.
- Step 303 When AF determines that HTTP 302 redirection needs to be triggered, AF sends a redirection notification message to UE; the redirection notification message carries first information; the first information is determined by AF based on second information pre-configured locally.
- Step 304 The UE initiates a service invocation request to the NEF based on the first information; the service invocation request carries the second information.
- the UE uses the first information returned by the AF and determined based on the authentication information pre-configured locally in the AF to request to invoke the NEF service.
- the UE invokes the NEF service based on the redirection.
- FIG. 4 is a schematic diagram of a specific implementation flow of the information interaction method according to an embodiment of the present application. As shown in FIG. 4 , the method includes steps 401 to 405:
- Step 401 The terminal (UE) sends a service request to the AF; the service request is used to request the service of the AF.
- Step 402 The AF sends a response message to the UE; the response message carries third information; the third information represents the UE information that the AF authenticates and can access the second network function (NEF).
- NEF second network function
- the AF determines that HTTP 302 redirection needs to be triggered, the AF authorizes the UE to call the service of the NEF and sends a redirection notification message to the UE; the redirection notification message carries the third information.
- the third information includes:
- AF's authentication information (such as authorization code).
- Step 403 The UE accesses the NEF through the UPF, or accesses the NEF through the AMF and SMF.
- FIG. 5 is a schematic diagram of a UE accessing a NEF through a UPF according to an embodiment of the present application. As shown in FIG. 5 , it may include:
- Step 1 UE accesses RAN and accesses UPF through the N3 interface between RAN and UPF, that is, UE sends a third request to UPF; the third request carries the third information; the third information represents the UE information that AF authenticates and can access NEF.
- the third information includes at least one of the following:
- Step 2 UPF can access NEF in the following two ways.
- UPF accesses NEF via N6 bypassing MEC DN.
- the second method is to establish a user plane tunnel between UPF and NEF when doing C-IoT, and UPF directly accesses NEF through this tunnel.
- FIG. 6 is a schematic diagram of a UE accessing an NEF through an AMF and an SMF according to an embodiment of the present application. As shown in FIG. 6 , the following may be included:
- Step 1 UE transmits NAS message to AMF via N1 interface.
- Step 2 AMF updates the context on SMF (update SM Context) by calling the service interface provided by SMF.
- Step 3 SMF establishes an SMF-NEF connection, carrying the third information.
- the third information includes at least one of the following:
- Step 404 The NEF authenticates the UE and sends authorization information, that is, fourth information, to the UE.
- the UE may receive the fourth information returned by the NEF through the UPF, and access the NEF based on the fourth information; wherein the fourth information is determined by the NEF based on the third information, and the fourth information represents the authentication information of the UE authenticated by the NEF to access the NEF.
- the UE can also receive the fourth information returned by the NEF through the AMF-SMF-NEF path, and access the NEF based on the fourth information; wherein the fourth information is determined by the NEF based on the third information, and the fourth information represents the authentication information of the UE authenticated by the NEF to access the NEF.
- Step 405 The UE sends a service request to the NEF; the service request carries the authentication/authorization information of the AF and the authorization information returned by the NEF.
- the UE carries the authentication information of the AF and requests online authorization from the NEF and calls the NEF service.
- the NEF authenticates the UE by online identifying the AF authentication information carried by the UE.
- NEF Accessing NEF by transmitting data through signaling, which is similar to the mechanism of secondary authentication.
- UE accesses NEF through NAS messages as well as AMF and SMF.
- the UE can directly access the AS to request to call the NEF service, and send relevant information to the PCF through the NEF, so that the PCF can send the tunnel configuration and data packet forwarding strategy to the SMF.
- the embodiment of the present application also provides an information interaction method, in which the fourth network function receives the fifth information sent by the fifth network function.
- the terminal can also access the second network function through the fifth network function to implement the call of the second network function service by the terminal, and then the fifth network function can send the fifth information to the fourth network function through the second network function.
- the fourth network function is provided with tunnel configuration and packet forwarding strategy based on the fifth information.
- FIG. 7 is a schematic diagram of an implementation flow of an information interaction method according to an embodiment of the present application. As shown in FIG. 7 , the method includes step 701:
- Step 701 The fourth network function receives fifth information sent by the fifth network function.
- the fifth information is sent by the fifth network function to the fourth network function through the second network function after the terminal accesses the second network function through the fifth network function.
- the fourth network function is a PCF; the fifth network function is an application or an application server or a service or a local application.
- the application function (AF)/application server (AS, Application Server) can send the fifth information to PCF through NEF.
- the fifth information is the request information sent by the AF/AS to the PCF through the NEF.
- the terminal can access the second network function through the fifth network function to implement the terminal's call to the second network function service, and then the fifth network function can send the fifth information to the fourth network function through the second network function, so that the fourth network function can be configured based on the fifth information, etc.
- the second network function is NEF.
- the fifth information includes:
- the tunnel or channel may be a tunnel or channel at a node granularity.
- the data packet information transmitted in the tunnel or channel is an IP triplet
- the IP triplet includes:
- the IP address of the local server is the IP address of the local server
- the IP address of the core server is the IP address of the core server
- the DNAI information is one or more.
- the IP triplet (or 3-tuple) includes the IP address of the local server, and/or the IP address of the core server, and/or the protocol.
- the local server can also be a MEC server, a local server, a local DN, a local part of DN, a cloud server, or a cloud phone.
- the core server can also be a central DN, a DN, or a central server.
- the protocol can also be a protocol, a communication protocol, or a protocol type.
- the method further comprises:
- the fourth network function generates sixth information according to the fifth information and/or the local network policy, and sends the sixth information to the sixth network function.
- the local network policy is the operator configuration policy and/or contract data, which can also be a local policy or a network policy.
- the contract data can indicate that the UE can use cloud services such as cloud phones, AR/VR, etc.
- the local network policy is an operator configuration policy and/or subscription data; and the sixth information is a network policy.
- the sixth information may specifically refer to the policy and charging control policy (PCC rule).
- PCC rule policy and charging control policy
- the sixth network function selects a suitable UPF according to the DNAI information in the sixth information, and configures corresponding data packet processing instructions.
- the UPF is a local PSA UPF, and/or a UL CL UPF, and/or a core PSA UPF.
- local PSA UPF can also be local PSA UPF, edge PSA UPF, or L-PSA UPF.
- UL CL UPF can also be the uplink diversion UPF, the Uplink Classifier UPF, the BP UPF, or the I-UPF.
- core PSA UPF can also be PSA UPF, central PSA UPF, or C-PSA UPF.
- the packet handling instruction can also be a packet handling instruction, a data forwarding rule, a packet detection rule (PDR, Packet Detection Rule), or a forwarding access rule (FAR, Forwarding Action Rule).
- PDR Packet Detection Rule
- FAR Forwarding Action Rule
- the sixth network function is SMF.
- the terminal may also access the second network function through the fifth network function, so as to implement the terminal's call of the second network function service, and further implement the fifth network function sending the fifth information to the fourth network function through the second network function, so that the fourth network function performs configuration based on the fifth information, etc.
- FIG8 is a schematic diagram of a specific implementation flow of the information interaction method according to an embodiment of the present application. As shown in FIG8 , the method includes steps 801 to 802:
- Step 801 The fifth network function (AS/AF) sends DNAI 1, DNAI 2, and DNAI 3 to NEF, carrying UE ID.
- Step 802 NEF preconfigures DNAI 1, DNAI 2 and DNAI 3 in the fourth network function (PCF).
- DNAI is pre-configured: before UE accesses, AS/AF sends the DNAI (DNAI 2) of the edge PSA UPF, the DNAI (DNAI 1) of the large area PSA UPF and the DNAI (DNAI 3) of the UL CL UPF to NEF along with the UE ID, and NEF pre-configures them in the PCF.
- FIG. 9 is a schematic diagram of a specific implementation flow of the information interaction method according to an embodiment of the present application. As shown in FIG. 9 , the method includes step 901:
- Step 901 The terminal (UE) initiates a service request to the fifth network function (AS).
- Step 902 AS requests to invoke NEF service.
- Step 903 NEF requests PCF to update the policy and configure PDR.
- AF influence is executed: UE accesses the network to the MEC server, triggering the activation of the MEC server, and directly requests services from the cloud server, triggering the service request process UE-AS-AF-NEF-PCF.
- PCF discovers that the server is a cloud server with pre-configured DNAI (DNAI 1, DNAI 2, DNAI3) information. It can dynamically update policies while connected, allowing PCF to configure PDR (PDR 3) for N6-N9-N9.
- DNAI DNAI 1, DNAI 2, DNAI3
- Figure 10a is a schematic diagram of the tunnel established by an embodiment of the present application.
- the SMF selects the UPF according to the policy issued by the PCF, and finds that the PCC rule assigned by the PCF to the SMF has three DNAIs, which are used for the selection of the core PSA UPF, UL CL UPF and local PSA UPF, as well as the establishment of the tunnel when the session is established.
- Figure 10b is a schematic diagram of the tunnel established in the embodiment of the present application. As shown in Figure 10b, a new tunnel is created between the core PSA UPF and the local PSA UPF without forwarding through the UL CL.
- PCF issues policies to set directions for the three sets of PDRs, adding a new PDR (PDR 3) for N6-N9-N9.
- PDR 3 a new PDR for N6-N9-N9.
- the MEC server includes its own IP address and the destination IP address (the IP address of DN) in the request.
- UPF recognizes that the destination address is also a server, which triggers the execution of the PDR (PDR 3) for N6-N9-N9.
- SMF After PCF sends tunnel configuration and packet forwarding policy to SMF, SMF configures packet processing instructions to the core PSA UPF, UL CL UPF and local PSA UPF according to the policy, to achieve data transmission with quality of service guaranteed from DN to cloud server.
- the present application also provides an information interaction method, the method comprising:
- the seventh network function receives the seventh information sent by the eighth network function.
- the seventh information is downlink data sent by the core server to the eighth network function
- the eighth network function forwards the downlink data sent from the core server to a tunnel or channel according to the data packet processing instruction, and sends it to the seventh network function.
- the packet handling instruction can also be a packet handling instruction, a data forwarding rule, a packet detection rule (PDR, Packet Detection Rule), or a forwarding access rule (FAR, Forwarding Action Rule).
- PDR Packet Detection Rule
- FAR Forwarding Action Rule
- the packet processing indication is information of the SMF configuration received by the eighth network function.
- the tunnel or channel is a tunnel or channel for transmitting data between the eighth network function and the seventh network function;
- the establishment of the tunnel or channel is generated based on the local network configuration.
- the seventh network function forwards the downlink data sent from the eighth network function to a tunnel or channel according to the data packet processing instruction, and sends it to the ninth network function.
- the ninth network function is a local PSA UPF.
- local PSA UPF can also be local PSA UPF, edge PSA UPF, or L-PSA UPF.
- the tunnel or channel is used for transmitting data between the eighth network function and the ninth network function.
- a tunnel or channel for data is used for transmitting data between the eighth network function and the ninth network function.
- the packet processing indication is information of an SMF configuration received by the seventh network function.
- forwarding of the downlink data between the eighth network function and the core server relies on the N6 tunnel.
- the N6 tunnel refers to the tunnel or channel for transmitting data between the local PSA UPF and the local server.
- the establishment of the N6 tunnel is generated based on the local network configuration.
- the seventh network function is UL CL UPF or I-UPF; the eighth network function is core PSA UPF.
- UL CL UPF can also be the uplink diversion UPF, the Uplink Classifier UPF, the BP UPF, or the I-UPF.
- core PSA UPF can also be PSA UPF, central PSA UPF, or C-PSA UPF.
- the SMF configures the data packet processing instructions to the core PSA UPF, UL CL UPF and local PSA UPF according to the strategy, so as to realize the data transmission with service quality guarantee from the cloud server to the DN.
- the embodiment of the present application also provides an information interaction method, which includes:
- the tenth network function receives the eighth information sent by the eleventh network function.
- the eighth information is downlink data sent by the local server to the eleventh network function
- the eleventh network function forwards the downlink data sent from the local server to a tunnel or channel according to the data packet processing instruction, and sends it to the tenth network function.
- the packet handling instruction can also be a packet handling instruction, a data forwarding rule, a packet detection rule (PDR, Packet Detection Rule), or a forwarding access rule (FAR, Forwarding Action Rule).
- PDR Packet Detection Rule
- FAR Forwarding Action Rule
- the packet processing indication is information of an SMF configuration received by the eleventh network function.
- the tunnel or channel is the eleventh network function and the tenth network function.
- the establishment of the tunnel or channel is generated based on the local network configuration.
- the tenth network function forwards the downlink data sent from the eleventh network function to a tunnel or channel according to the data packet processing instruction, and sends it to the twelfth network function.
- the twelfth network function is a core PSA UPF.
- core PSA UPF can also be PSA UPF, central PSA UPF, or C-PSA UPF.
- the tunnel or channel is a tunnel or channel for transmitting data between the eleventh network function and the twelfth network function.
- the packet processing indication is information configured for an SMF received by the tenth network function.
- forwarding of the downlink data between the eleventh network function and the local server relies on an N6 tunnel.
- the N6 tunnel refers to the tunnel or channel for transmitting data between the local PSA UPF and the local server.
- the establishment of the N6 tunnel is generated based on the local network configuration.
- the tenth network function is UL CL UPF or I-UPF; the eleventh network function is a local PSA UPF.
- the embodiment of the present application also provides an information interaction method, the method comprising:
- the thirteenth network function receives the ninth information sent by the fourteenth network function.
- the ninth information is downlink data sent by the core server to the fourteenth network function
- the fourteenth network function forwards the downlink data sent from the core server to a tunnel or channel according to the packet processing instruction, and sends it to the thirteenth network function.
- the packet processing indication is information configured for an SMF received by the fourteenth network function.
- the packet handling instruction can also be a packet handling instruction, a data forwarding rule, a packet detection rule (PDR, Packet Detection Rule), or a forwarding access rule (FAR, Forwarding Action Rule).
- PDR Packet Detection Rule
- FAR Forwarding Action Rule
- the tunnel or channel is a tunnel or channel for transmitting data between the fourteenth network function and the thirteenth network function;
- the establishment of the tunnel or channel is generated based on the local network configuration.
- the forwarding of the downlink data between the fourteenth network function and the core server relies on the N6 tunnel.
- the N6 tunnel refers to the tunnel or channel for transmitting data between the local PSA UPF and the local server.
- the establishment of the N6 tunnel is generated based on the local network configuration.
- the thirteenth network function is a local PSA UPF; the fourteenth network function is a core PSA UPF.
- local PSA UPF can also be local PSA UPF, edge PSA UPF, or L-PSA UPF.
- core PSA UPF can also be PSA UPF, central PSA UPF, or C-PSA UPF.
- the embodiment of the present application also provides an information interaction method, the method comprising:
- the fifteenth network function receives the tenth information sent by the sixteenth network function.
- the tenth information is downlink data sent by the core server to the sixteenth network function
- the sixteenth network function forwards the downlink data sent from the local server to a tunnel or channel according to the data packet processing instruction, and sends it to the fifteenth network function.
- the packet processing instruction may also be a packet handling instruction, a data forwarding rule, a packet detection rule (PDR), or a forwarding access rule (FAR).
- PDR packet detection rule
- FAR forwarding access rule
- the packet processing indication is information configured for an SMF received by the sixteenth network function.
- the tunnel or channel is a tunnel or channel for transmitting data between the sixteenth network function and the fifteenth network function
- the establishment of the tunnel or channel is generated based on the local network configuration.
- forwarding of the downlink data between the sixteenth network function and the local server relies on an N6 tunnel.
- the N6 tunnel refers to the tunnel or channel for transmitting data between the local PSA UPF and the local server.
- the establishment of the N6 tunnel is generated based on the local network configuration.
- the fifteenth network function is a core PSA UPF; the sixteenth network function is a local PSA UPF.
- local PSA UPF can also be local PSA UPF, edge PSA UPF, or L-PSA UPF.
- core PSA UPF can also be PSA UPF, central PSA UPF, or C-PSA UPF.
- FIG11 is a schematic diagram of the composition structure of the information interaction device of the embodiment of the present application. As shown in FIG11, the device includes:
- the processing unit 111 is configured to access the second network function through the first network function.
- the first network function includes one of the following: AF, UPF, AMF; the second network function is NEF.
- the processing unit 111 is configured to:
- the first information is used by the terminal to request the second network function to authorize access;
- the second network function is accessed.
- the first information includes at least one of the following:
- the processing unit 111 is configured to:
- the contract signing data is obtained
- the first information is determined by the first network function based on the subscription data when determining to initiate redirection to the terminal;
- the second network function is accessed.
- the first network function is AF
- the second network function is NEF
- the processing unit 111 is configured to:
- the first information is determined by the first network function based on second information pre-configured locally when determining to initiate redirection to the terminal;
- the second network function is accessed.
- the second information pre-configured locally is pre-configured on the first network function through interaction between the first network function and the second network function.
- the first network function is AF
- the second network function is NEF
- the processing unit 111 is configured to:
- the first network function responds to the third request by bypassing the MEC DN through the N6 interface to access the second network function, or by connecting the first network function to the second network function.
- a user plane tunnel is used to access the second network function.
- the first network function is UPF
- the second network function is NEF
- the processing unit 111 is configured to:
- the first network function updates the context on the third network function by calling a service interface provided by the third network function; the third network function sends a fourth request to the second network function to access the second network function; and the fourth request carries third information.
- the first network function is AMF
- the second network function is NEF
- the third network function is SMF
- the device is further used for:
- the fourth information is determined by the second network function based on the third information, and the fourth information represents authentication information of the terminal authenticating access to the second network function by the second network function.
- the third information includes at least one of the following:
- processing unit 111 can be implemented by a processor in the information interaction device.
- the information interaction device provided in the above embodiment only uses the division of the above program modules as an example when accessing.
- the above processing can be assigned to different program modules as needed, that is, the internal structure of the device is divided into different program modules to complete all or part of the processing described above.
- the information interaction device provided in the above embodiment and the information interaction method embodiment belong to the same concept, and the specific implementation process is detailed in the method embodiment, which will not be repeated here.
- the embodiment of the present application also provides an information interaction device, which is set in the fourth network function.
- Figure 12 is a schematic diagram of the composition structure of the information interaction device of the embodiment of the present application. As shown in Figure 12, the device includes:
- the first receiving unit 121 is configured to receive fifth information sent by a fifth network function.
- the fifth information includes:
- DNAI information and/or,
- the tunnel or channel may be a tunnel or channel at a node granularity.
- the data packet information transmitted in the tunnel or channel is an IP triplet, including:
- the IP address of the local server and/or,
- the IP address of the core server and/or,
- the DNAI is one or more.
- the DNAI may be one or more.
- the method further comprises:
- the fourth network function generates sixth information according to the fifth information and/or the local network policy, and sends the sixth information to the sixth network function.
- the local network policy is an operator configuration policy and/or contract data
- the contract data may indicate that the terminal can use cloud services such as cloud phones, AR/VR, etc.
- the sixth information is the network policy.
- the sixth network function selects a suitable UPF according to the DNAI information in the sixth information, and configures corresponding data packet processing instructions.
- the UPF is a local PDU session anchor PSA UPF, and/or an uplink classifier UL CL UPF, and/or a core PSA UPF.
- the sixth network function is SMF.
- the fourth network function is a PCF; the fifth network function is an application or an application server or a service or a local application.
- the first receiving unit 121 can be implemented by a communication interface in the information interaction device; the processing unit can be implemented by a processor in the information interaction device.
- the information interaction device provided in the above embodiment performs information interaction
- only the division of the above program modules is used as an example for explanation.
- the above processing can be assigned to different program modules as needed, that is, the internal structure of the device can be divided into different program modules.
- the information interaction device and the information interaction method provided in the above embodiment belong to the same concept, and the specific implementation process is detailed in the method embodiment, which will not be repeated here.
- the embodiment of the present application further provides an information interaction device, which is set in the seventh network function, and the device includes:
- the second receiving unit is used to receive seventh information sent by the eighth network function.
- the seventh information is downlink data sent by the core server to the eighth network function
- the eighth network function forwards the downlink data sent from the core server to a tunnel or channel according to the data packet processing instruction, and sends it to the seventh network function.
- the packet processing indication is information of the SMF configuration received by the eighth network function.
- the tunnel or channel is a tunnel or channel for transmitting data between the eighth network function and the seventh network function;
- the establishment of the tunnel or channel is generated based on the local network configuration.
- the device is used to: forward the downlink data sent from the eighth network function to a tunnel or channel according to the data packet processing instruction, and send it to the ninth network function.
- the ninth network function is a local PSA UPF.
- the tunnel or channel is a tunnel or channel for transmitting data between the eighth network function and the ninth network function.
- the packet processing indication is information of an SMF configuration received by the seventh network function.
- forwarding of the downlink data between the eighth network function and the core server relies on the N6 tunnel.
- the establishment of the N6 tunnel is generated based on the local network configuration.
- the seventh network function is UL CL UPF or I-UPF; the eighth network function is core PSA UPF.
- the embodiment of the present application also provides an information interaction device, which is set in the tenth network function, and the device includes:
- the third receiving unit is used to receive the eighth information sent by the eleventh network function.
- the eighth information is downlink data sent by the local server to the eleventh network function
- the eleventh network function forwards the downlink data sent from the local server to a tunnel or channel according to the data packet processing instruction, and sends it to the tenth network function.
- the packet processing indication is information of an SMF configuration received by the eleventh network function.
- the tunnel or channel is a tunnel or channel for transmitting data between the eleventh network function and the tenth network function
- the establishment of the tunnel or channel is generated based on the local network configuration.
- the device is used to: forward the downlink data sent from the eleventh network function to a tunnel or channel according to a data packet processing instruction, and send it to the twelfth network function.
- the twelfth network function is a core PSA UPF.
- the tunnel or channel is a tunnel or channel for transmitting data between the eleventh network function and the twelfth network function.
- the packet processing indication is information configured for an SMF received by the tenth network function.
- forwarding of the downlink data between the eleventh network function and the local server relies on an N6 tunnel.
- the establishment of the N6 tunnel is generated based on the local network configuration.
- the tenth network function is UL CL UPF or I-UPF; the eleventh network function is a local PSA UPF.
- the embodiment of the present application further provides an information interaction device, which is set in the thirteenth network function, and the device includes:
- the fourth receiving unit is used to receive ninth information sent by the fourteenth network function.
- the ninth information is sent by the core server to the fourteenth network function.
- Downlink data
- the fourteenth network function forwards the downlink data sent from the core server to a tunnel or channel according to the packet processing instruction, and sends it to the thirteenth network function.
- the packet processing indication is information configured for an SMF received by the fourteenth network function.
- the tunnel or channel is a tunnel or channel for transmitting data between the fourteenth network function and the thirteenth network function;
- the establishment of the tunnel or channel is generated based on the local network configuration.
- forwarding of the downlink data between the fourteenth network function and the core server relies on the N6 tunnel.
- the establishment of the N6 tunnel is generated based on the local network configuration.
- the thirteenth network function is a local PSA UPF; the fourteenth network function is a core PSA UPF.
- the embodiment of the present application also provides an information interaction device, which is set in the fifteenth network function, and the device includes:
- the fifth receiving unit is used to receive the tenth information sent by the sixteenth network function.
- the tenth information is downlink data sent by the core server to the sixteenth network function
- the sixteenth network function forwards the downlink data sent from the local server to a tunnel or channel according to the data packet processing instruction, and sends it to the fifteenth network function.
- the packet processing indication is information configured for an SMF received by the sixteenth network function.
- the tunnel or channel is a tunnel or channel for transmitting data between the sixteenth network function and the fifteenth network function
- the establishment of the tunnel or channel is generated based on the local network configuration.
- forwarding of the downlink data between the sixteenth network function and the local server relies on an N6 tunnel.
- the establishment of the N6 tunnel is generated based on the local network configuration.
- the fifteenth network function is a core PSA UPF; the sixteenth network function Can be a local PSA UPF.
- the embodiment of the present application further provides a terminal, as shown in FIG13 , including:
- the first communication interface 131 is capable of exchanging information with other devices
- the first processor 132 is connected to the first communication interface 131 and is used to execute the method provided by one or more technical solutions on the terminal side when running a computer program.
- the computer program is stored in the first memory 133.
- bus system 134 is used to realize the connection and communication between these components.
- bus system 134 also includes a power bus, a control bus and a status signal bus.
- various buses are marked as the bus system 134 in FIG. 13.
- the first memory 133 in the embodiment of the present application is used to store various types of data to support the operation of the terminal 130. Examples of such data include: any computer program used to operate on the terminal 130.
- the method disclosed in the above embodiment of the present application can be applied to the first processor 132, or implemented by the first processor 132.
- the first processor 132 may be an integrated circuit chip with signal processing capabilities. In the implementation process, each step of the above method can be completed by the hardware integrated logic circuit in the first processor 132 or the instruction in the form of software.
- the above first processor 132 may be a general processor, a digital data processor (DSP, Digital Signal Processor), or other programmable logic devices, discrete gates or transistor logic devices, discrete hardware components, etc.
- the first processor 132 can implement or execute the various methods, steps and logic block diagrams disclosed in the embodiment of the present application.
- the general processor may be a microprocessor or any conventional processor, etc.
- the steps of the method disclosed in the embodiment of the present application can be directly embodied as being executed by a hardware decoding processor, or being executed by a combination of hardware and software modules in the decoding processor.
- the software module may be located in a storage medium, which is located in the first memory 133.
- the first processor 132 reads the information in the first memory 133 and completes the steps of the above method in combination with its hardware.
- the embodiment of the present application further provides a network device, as shown in FIG14 , including:
- the second communication interface 141 is capable of exchanging information with other devices
- the second processor 142 is connected to the second communication interface 141 and is used to run the computer program.
- the method provided by one or more technical solutions on the network device side is executed.
- the computer program is stored in the second memory 143.
- bus system 144 is used to realize the connection and communication between these components.
- bus system 144 also includes a power bus, a control bus and a status signal bus.
- various buses are marked as the bus system 144 in Figure 14.
- the second memory 143 in the embodiment of the present application is used to store various types of data to support the operation of the network device 140. Examples of such data include: any computer program used to operate on the network device 140.
- the method disclosed in the above embodiment of the present application can be applied to the second processor 142, or implemented by the second processor 142.
- the second processor 142 may be an integrated circuit chip with signal processing capabilities. In the implementation process, each step of the above method can be completed by the hardware integrated logic circuit in the second processor 142 or the instruction in the form of software.
- the above second processor 142 may be a general processor, a digital data processor (DSP, Digital Signal Processor), or other programmable logic devices, discrete gates or transistor logic devices, discrete hardware components, etc.
- the second processor 142 can implement or execute the various methods, steps and logic block diagrams disclosed in the embodiment of the present application.
- the general processor may be a microprocessor or any conventional processor, etc.
- the steps of the method disclosed in the embodiment of the present application can be directly embodied as being executed by a hardware decoding processor, or being executed by a combination of hardware and software modules in the decoding processor.
- the software module can be located in a storage medium, which is located in the second memory 143.
- the second processor 142 reads the information in the second memory 143 and completes the steps of the above method in combination with its hardware.
- the terminal 130 and the network device 140 may be implemented by one or more application specific integrated circuits (ASIC), DSP, programmable logic device (PLD), complex programmable logic device (CPLD), field programmable gate array (FPGA), general processor, controller, microcontroller (MCU), microprocessor, or other electronic components to execute the aforementioned method.
- ASIC application specific integrated circuits
- DSP digital signal processor
- PLD programmable logic device
- CPLD complex programmable logic device
- FPGA field programmable gate array
- general processor controller
- MCU microcontroller
- microprocessor or other electronic components to execute the aforementioned method.
- the memory (first memory 133, second memory 143) of the embodiment of the present application can be a volatile memory or a non-volatile memory, and can also include both volatile and non-volatile memories.
- the non-volatile memory can be a read-only memory (ROM), a programmable read-only memory (PROM), an erasable programmable read-only memory (EPROM), an electrically erasable programmable read-only memory (EEPROM), a magnetic random access memory (FRAM), a flash memory, a magnetic surface memory, an optical disc, or a compact disc read-only memory (CD-ROM);
- the magnetic surface memory can be a disk memory or a tape memory.
- Volatile memory can be random access memory (RAM), which is used as external cache.
- RAM random access memory
- RAM random access memory
- SRAM static random access memory
- SSRAM synchronous static random access memory
- DRAM dynamic random access memory
- SDRAM synchronous dynamic random access memory
- DDRSDRAM double data rate synchronous dynamic random access memory
- ESDRAM enhanced synchronous dynamic random access memory
- SLDRAM synchronous link dynamic random access memory
- DRRAM direct memory bus random access memory
- the memory described in the embodiments of the present application is intended to include, but is not limited to, these and any other suitable types of memory.
- the embodiment of the present application further provides a storage medium, namely a computer storage medium, specifically a computer-readable storage medium, for example, a memory storing a computer program, and the computer program can be executed by the first processor 132 of the terminal 130 to complete the steps described in the aforementioned terminal-side method.
- the computer-readable storage medium can be a memory such as FRAM, ROM, PROM, EPROM, EEPROM, Flash Memory, magnetic surface storage, optical disk, or CD-ROM.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
Description
相关申请的交叉引用CROSS-REFERENCE TO RELATED APPLICATIONS
本申请基于申请号为2023103711644、申请日为2023年04月07日的中国专利申请提出,并要求该中国专利申请的优先权,该中国专利申请的全部内容在此以全文引入的方式引入本申请。This application is based on the Chinese patent application with application number 2023103711644 and application date April 7, 2023, and claims the priority of the Chinese patent application. The entire content of the Chinese patent application is hereby introduced into this application in its entirety.
本申请涉及无线通信技术领域,尤其涉及一种信息交互方法、装置、设备及存储介质。The present application relates to the field of wireless communication technology, and in particular to an information interaction method, device, equipment and storage medium.
目前,通常是应用调用网络开放功能(NEF,Network open function)的服务,应用功能(AF,Application Function)获得NEF的应用程序接口(API,Application Program Interface)接口之后,去通用的API开放框架(CAPIF,Common API Framework for 3GPP Northbound APIs)注册,从而获得NEF的授权。但是,目前只支持NEF对AF访问的授权,而不支持NEF对UE访问的授权,导致NEF无法向UE提供服务。At present, applications usually call the service of the network open function (NEF). After the application function (AF) obtains the application program interface (API) of NEF, it registers with the Common API Framework for 3GPP Northbound APIs (CAPIF) to obtain the authorization of NEF. However, currently only NEF's authorization to access AF is supported, but not NEF's authorization to access UE, resulting in NEF being unable to provide services to UE.
发明内容Summary of the invention
有鉴于此,本申请实施例期望提供一种信息交互方法、装置、设备及存储介质。In view of this, embodiments of the present application hope to provide an information interaction method, apparatus, device and storage medium.
本申请实施例的技术方案是这样实现的:The technical solution of the embodiment of the present application is implemented as follows:
本申请实施例提供一种信息交互方法,所述方法包括:The present application provides an information interaction method, the method comprising:
终端通过第一网络功能,访问第二网络功能。The terminal accesses the second network function through the first network function.
此外,根据本申请的至少一个实施例,所述第一网络功能包括以下之一:AF、用户面功能(UPF,User Plane Function)、接入和移动管理功能(AMF,Access and Mobility management Function);所述第二网络功能为NEF。 In addition, according to at least one embodiment of the present application, the first network function includes one of the following: AF, user plane function (UPF), access and mobility management function (AMF); the second network function is NEF.
此外,根据本申请的至少一个实施例,所述终端通过第一网络功能,访问第二网络功能,包括:In addition, according to at least one embodiment of the present application, the terminal accesses the second network function through the first network function, including:
接收所述第一网络功能发送的第一信息;所述第一信息用于所述终端请求所述第二网络功能授权访问;receiving first information sent by the first network function; the first information is used by the terminal to request the second network function to authorize access;
基于所述第一信息,访问所述第二网络功能。Based on the first information, the second network function is accessed.
此外,根据本申请的至少一个实施例,所述第一信息,包括以下至少之一:In addition, according to at least one embodiment of the present application, the first information includes at least one of the following:
所述第二网络功能的统一资源标识符(URI,Uniform Resource Identifier);a Uniform Resource Identifier (URI) of the second network function;
单个网络切片选择协助信息(S-NSSAI,Single Network Slice Selection Assistance Information);Single Network Slice Selection Assistance Information (S-NSSAI);
数据网络名称(DNN,Data Network Name);Data network name (DNN);
完全合格域名(FQDN,Fully Qualified Domain Name);Fully Qualified Domain Name (FQDN);
网络互连协议(IP)五元组;Internet Protocol (IP) quintuple;
应用标识(App ID,Application Identifier);Application Identifier (App ID);
流描述信息(FDI,Flow Description Information);Flow Description Information (FDI);
通用公共用户标识(GPSI,Generic Public Subscription Identifier)。Generic Public Subscription Identifier (GPSI).
此外,根据本申请的至少一个实施例,所述终端通过第一网络功能,访问第二网络功能,包括:In addition, according to at least one embodiment of the present application, the terminal accesses the second network function through the first network function, including:
在建立会话过程中,获取签约数据;During the session establishment process, the contract signing data is obtained;
向所述第一网络功能发送第一请求;所述第一请求用于请求调用所述第一网络功能的服务;所述第一请求携带有所述签约数据;Sending a first request to the first network function; the first request is used to request to call a service of the first network function; the first request carries the subscription data;
接收所述第一网络功能返回的第一信息;所述第一信息是所述第一网络功能在确定向所述终端发起重定向的情况下基于所述签约数据确定的;receiving first information returned by the first network function; the first information is determined by the first network function based on the subscription data when determining to initiate redirection to the terminal;
基于所述第一信息,访问所述第二网络功能。Based on the first information, the second network function is accessed.
此外,根据本申请的至少一个实施例,所述第一网络功能为AF,所述第二网络功能为NEF。In addition, according to at least one embodiment of the present application, the first network function is AF, and the second network function is NEF.
此外,根据本申请的至少一个实施例,所述终端通过第一网络功能,访问第二网络功能,包括:In addition, according to at least one embodiment of the present application, the terminal accesses the second network function through the first network function, including:
向所述第一网络功能发送第二请求;所述第二请求用于请求调用所述第一网络功能的服务;Sending a second request to the first network function; the second request is used to request to call a service of the first network function;
接收所述第一网络功能返回的第一信息;所述第一信息是所述第一网络功 能在确定向所述终端发起重定向的情况下基于预先配置在本地的第二信息确定的;Receive first information returned by the first network function; the first information is the first network function It can be determined based on second information pre-configured locally when it is determined to initiate redirection to the terminal;
基于所述第一信息,访问所述第二网络功能。Based on the first information, the second network function is accessed.
此外,根据本申请的至少一个实施例,所述预先配置在本地的第二信息是通过所述第一网络功能与所述第二网络功能交互,预先配置在所述第一网络功能上的。In addition, according to at least one embodiment of the present application, the second information pre-configured locally is pre-configured on the first network function through interaction between the first network function and the second network function.
此外,根据本申请的至少一个实施例,所述第一网络功能为AF,所述第二网络功能为NEF。In addition, according to at least one embodiment of the present application, the first network function is AF, and the second network function is NEF.
此外,根据本申请的至少一个实施例,所述终端通过第一网络功能,访问第二网络功能,包括:In addition, according to at least one embodiment of the present application, the terminal accesses the second network function through the first network function, including:
接入无线接入网(RAN,Radio Access Network);Access to the Radio Access Network (RAN);
通过RAN与所述第一网络功能之间的N3接口,向所述第一网络功能发送第三请求;所述第三请求携带第三信息;Sending a third request to the first network function through an N3 interface between the RAN and the first network function; the third request carries third information;
其中,所述第一网络功能响应所述第三请求,通过N6接口绕行多接入边缘计算(MEC,Multi-access Edge Computing)数据网络(DN,Data Network),访问第二网络功能,或者,通过所述第一网络功能和所述第二网络功能之间的用户面隧道,访问所述第二网络功能。The first network function responds to the third request, accesses the second network function through the N6 interface bypassing the multi-access edge computing (MEC) data network (DN, Data Network), or accesses the second network function through a user plane tunnel between the first network function and the second network function.
此外,根据本申请的至少一个实施例,所述第一网络功能为UPF,所述第二网络功能为NEF。In addition, according to at least one embodiment of the present application, the first network function is UPF, and the second network function is NEF.
此外,根据本申请的至少一个实施例,所述终端通过第一网络功能,访问第二网络功能,包括:In addition, according to at least one embodiment of the present application, the terminal accesses the second network function through the first network function, including:
向所述第一网络功能发送非接入层(NAS,Non-Access-Stratum)消息;Sending a non-access stratum (NAS) message to the first network function;
其中,所述第一网络功能通过调用第三网络功能提供的服务接口,在所述第三网络功能上更新上下文;所述第三网络功能向所述第二网络功能发送第四请求,以访问所述第二网络功能;所述第四请求携带第三信息。The first network function updates the context on the third network function by calling a service interface provided by the third network function; the third network function sends a fourth request to the second network function to access the second network function; and the fourth request carries third information.
此外,根据本申请的至少一个实施例,所述第一网络功能为接入和移动管理功能AMF,所述第二网络功能为NEF,所述第三网络功能为SMF。In addition, according to at least one embodiment of the present application, the first network function is an access and mobility management function AMF, the second network function is NEF, and the third network function is SMF.
此外,根据本申请的至少一个实施例,所述方法还包括:In addition, according to at least one embodiment of the present application, the method further includes:
所述终端接收所述第二网络功能返回的第四信息;The terminal receives fourth information returned by the second network function;
其中,所述第四信息是所述第二网络功能基于所述第三信息确定的,所述 第四信息表征经所述第二网络功能认证所述终端访问所述第二网络功能的鉴权信息。The fourth information is determined by the second network function based on the third information, The fourth information represents authentication information of the terminal authenticating the second network function to access the second network function.
此外,根据本申请的至少一个实施例,所述第三信息,包括以下至少之一:In addition, according to at least one embodiment of the present application, the third information includes at least one of the following:
用户标识(UE ID);User identification (UE ID);
协议数据单元(PDU,Protocol Data Unit)会话ID;Protocol Data Unit (PDU) session ID;
S-NSSAI;S-NSSAI;
DNN。DNN.
本申请的至少一个实施例提供一种信息交互方法,所述方法包括:At least one embodiment of the present application provides an information interaction method, the method comprising:
第四网络功能接收第五网络功能发送的第五信息。The fourth network function receives fifth information sent by the fifth network function.
此外,根据本申请的至少一个实施例,所述第五信息包括:In addition, according to at least one embodiment of the present application, the fifth information includes:
DNAI信息;DNAI information;
和/或,and/or,
在隧道或通道内传输的数据包信息;Packet information transmitted within a tunnel or channel;
和/或,and/or,
UE ID或UE标识。UE ID or UE identification.
此外,根据本申请的至少一个实施例,所述在隧道或通道内传输的数据包信息为IP三元组,所述IP三元组包括:In addition, according to at least one embodiment of the present application, the data packet information transmitted in the tunnel or channel is an IP triplet, and the IP triplet includes:
本地服务器的IP地址;The IP address of the local server;
和/或,and/or,
核心服务器的IP地址;The IP address of the core server;
和/或,and/or,
协议。protocol.
此外,根据本申请的至少一个实施例,所述DNAI是一个或多个。In addition, according to at least one embodiment of the present application, the DNAI is one or more.
此外,根据本申请的至少一个实施例,所述方法还包括:In addition, according to at least one embodiment of the present application, the method further includes:
所述第四网络功能根据所述第五信息和/或本地网络策略生成第六信息,并发送给第六网络功能。The fourth network function generates sixth information according to the fifth information and/or the local network policy, and sends the sixth information to the sixth network function.
此外,根据本申请的至少一个实施例,所述本地网络策略为运营商配置策略和/或签约数据;所述第六信息为网络策略。In addition, according to at least one embodiment of the present application, the local network policy is an operator configuration policy and/or subscription data; and the sixth information is a network policy.
此外,根据本申请的至少一个实施例,所述方法还包括:In addition, according to at least one embodiment of the present application, the method further includes:
所述第六网络功能根据所述第六信息中的DNAI信息选择合适的UPF,并 配置相应的数据包处理指示。The sixth network function selects a suitable UPF according to the DNAI information in the sixth information, and Configure the corresponding packet processing instructions.
此外,根据本申请的至少一个实施例,所述UPF为本地PDU会话锚点(PSA)UPF,和/或上行链路分类器(UL CL)UPF,和/或核心PSA UPF。In addition, according to at least one embodiment of the present application, the UPF is a local PDU session anchor (PSA) UPF, and/or an uplink classifier (UL CL) UPF, and/or a core PSA UPF.
此外,根据本申请的至少一个实施例,所述第六网络功能为SMF。In addition, according to at least one embodiment of the present application, the sixth network function is SMF.
此外,根据本申请的至少一个实施例,所述第四网络功能为PCF;所述第五网络功能为应用或应用服务器或业务或本地应用。In addition, according to at least one embodiment of the present application, the fourth network function is a PCF; and the fifth network function is an application or an application server or a service or a local application.
本申请的至少一个实施例提供一种信息交互方法,所述方法包括:At least one embodiment of the present application provides an information interaction method, the method comprising:
第七网络功能接收第八网络功能发送的第七信息。The seventh network function receives the seventh information sent by the eighth network function.
此外,根据本申请的至少一个实施例,所述第七信息是核心服务器发送给所述第八网络功能的下行数据;In addition, according to at least one embodiment of the present application, the seventh information is downlink data sent by the core server to the eighth network function;
所述第八网络功能根据数据包处理指示,将从所述核心服务器发送的所述下行数据,转发到隧道或通道,并发送至所述第七网络功能。The eighth network function forwards the downlink data sent from the core server to a tunnel or channel according to the data packet processing instruction, and sends it to the seventh network function.
此外,根据本申请的至少一个实施例,所述数据包处理指示为所述第八网络功能接收的SMF配置的信息。In addition, according to at least one embodiment of the present application, the packet processing indication is information of the SMF configuration received by the eighth network function.
此外,根据本申请的至少一个实施例,所述隧道或通道为所述第八网络功能和所述第七网络功能之间传输数据的隧道或通道;In addition, according to at least one embodiment of the present application, the tunnel or channel is a tunnel or channel for transmitting data between the eighth network function and the seventh network function;
所述隧道或通道的建立是依靠本地网络配置生成的。The establishment of the tunnel or channel is generated based on the local network configuration.
此外,根据本申请的至少一个实施例,所述第七网络功能根据数据包处理指示,将从所述第八网络功能发送的所述下行数据,转发到隧道或通道,并发送至第九网络功能。In addition, according to at least one embodiment of the present application, the seventh network function forwards the downlink data sent from the eighth network function to a tunnel or channel according to the data packet processing instruction, and sends it to the ninth network function.
此外,根据本申请的至少一个实施例,所述第九网络功能为本地PSA UPF。In addition, according to at least one embodiment of the present application, the ninth network function is a local PSA UPF.
此外,根据本申请的至少一个实施例,所述隧道或通道为第八网络功能和第九网络功能之间传输数据的隧道或通道。In addition, according to at least one embodiment of the present application, the tunnel or channel is a tunnel or channel for transmitting data between the eighth network function and the ninth network function.
此外,根据本申请的至少一个实施例,所述数据包处理指示为所述第七网络功能接收的SMF配置的信息。In addition, according to at least one embodiment of the present application, the packet processing indication is information of the SMF configuration received by the seventh network function.
此外,根据本申请的至少一个实施例,所述下行数据在所述第八网络功能和所述核心服务器之间的转发依靠N6隧道。In addition, according to at least one embodiment of the present application, the forwarding of the downlink data between the eighth network function and the core server relies on the N6 tunnel.
此外,根据本申请的至少一个实施例,所述N6隧道的建立是依靠本地网络配置生成的。In addition, according to at least one embodiment of the present application, the establishment of the N6 tunnel is generated by relying on local network configuration.
此外,根据本申请的至少一个实施例,所述第七网络功能为UL CL UPF或 I-UPF;所述第八网络功能为核心PSA UPF。In addition, according to at least one embodiment of the present application, the seventh network function is UL CL UPF or I-UPF; the eighth network function is the core PSA UPF.
本申请的至少一个实施例提供一种信息交互方法,所述方法包括:At least one embodiment of the present application provides an information interaction method, the method comprising:
第十网络功能接收第十一网络功能发送的第八信息。The tenth network function receives the eighth information sent by the eleventh network function.
此外,根据本申请的至少一个实施例,所述第八信息是本地服务器发送给所述第十一网络功能的下行数据;In addition, according to at least one embodiment of the present application, the eighth information is downlink data sent by the local server to the eleventh network function;
所述第十一网络功能根据数据包处理指示,将从所述本地服务器发送的所述下行数据,转发到隧道或通道,并发送至所述第十网络功能。The eleventh network function forwards the downlink data sent from the local server to a tunnel or channel according to the data packet processing instruction, and sends it to the tenth network function.
此外,根据本申请的至少一个实施例,所述数据包处理指示为所述第十一网络功能接收的SMF配置的信息。In addition, according to at least one embodiment of the present application, the packet processing indication is information of the SMF configuration received by the eleventh network function.
此外,根据本申请的至少一个实施例,所述隧道或通道为所述第十一网络功能和所述第十网络功能之间传输数据的隧道或通道;In addition, according to at least one embodiment of the present application, the tunnel or channel is a tunnel or channel for transmitting data between the eleventh network function and the tenth network function;
所述隧道或通道的建立是依靠本地网络配置生成的。The establishment of the tunnel or channel is generated based on the local network configuration.
此外,根据本申请的至少一个实施例,所述第十网络功能根据数据包处理指示,将从所述第十一网络功能发送的所述下行数据,转发到隧道或通道,并发送至所述第十二网络功能。In addition, according to at least one embodiment of the present application, the tenth network function forwards the downlink data sent from the eleventh network function to a tunnel or channel according to the data packet processing instruction, and sends it to the twelfth network function.
此外,根据本申请的至少一个实施例,所述第十二网络功能为核心PSA UPF。In addition, according to at least one embodiment of the present application, the twelfth network function is a core PSA UPF.
此外,根据本申请的至少一个实施例,所述隧道或通道为所述第十一网络功能和所述第十二网络功能之间传输数据的隧道或通道。In addition, according to at least one embodiment of the present application, the tunnel or channel is a tunnel or channel for transmitting data between the eleventh network function and the twelfth network function.
此外,根据本申请的至少一个实施例,所述数据包处理指示为所述第十网络功能接收的SMF配置的信息。In addition, according to at least one embodiment of the present application, the packet processing indication is information of the SMF configuration received by the tenth network function.
此外,根据本申请的至少一个实施例,所述下行数据在所述第十一网络功能和所述本地服务器之间的转发依靠N6隧道。In addition, according to at least one embodiment of the present application, the forwarding of the downlink data between the eleventh network function and the local server relies on the N6 tunnel.
此外,根据本申请的至少一个实施例,所述N6隧道的建立是依靠本地网络配置生成的。In addition, according to at least one embodiment of the present application, the establishment of the N6 tunnel is generated by relying on local network configuration.
此外,根据本申请的至少一个实施例,所述第十网络功能为UL CL UPF或I-UPF;所述第十一网络功能为本地PSA UPF。In addition, according to at least one embodiment of the present application, the tenth network function is UL CL UPF or I-UPF; the eleventh network function is a local PSA UPF.
本申请的至少一个实施例提供一种信息交互方法,所述方法包括:At least one embodiment of the present application provides an information interaction method, the method comprising:
第十三网络功能接收第十四网络功能发送的第九信息。The thirteenth network function receives the ninth information sent by the fourteenth network function.
此外,根据本申请的至少一个实施例,所述第九信息是核心服务器发送给 所述第十四网络功能的下行数据;In addition, according to at least one embodiment of the present application, the ninth information is sent by the core server to downlink data of the fourteenth network function;
所述第十四网络功能根据数据包处理指示,将从所述核心服务器发送的所述下行数据,转发到隧道或通道,并发送至所述第十三网络功能。The fourteenth network function forwards the downlink data sent from the core server to a tunnel or channel according to the packet processing instruction, and sends it to the thirteenth network function.
此外,根据本申请的至少一个实施例,所述数据包处理指示为所述第十四网络功能接收的SMF配置的信息。In addition, according to at least one embodiment of the present application, the packet processing indication is information of the SMF configuration received by the fourteenth network function.
此外,根据本申请的至少一个实施例,所述隧道或通道为所述第十四网络功能和所述第十三网络功能之间传输数据的隧道或通道;In addition, according to at least one embodiment of the present application, the tunnel or channel is a tunnel or channel for transmitting data between the fourteenth network function and the thirteenth network function;
所述隧道或通道的建立是依靠本地网络配置生成的。The establishment of the tunnel or channel is generated based on the local network configuration.
此外,根据本申请的至少一个实施例,所述下行数据在所述第十四网络功能和所述核心服务器之间的转发依靠N6隧道。In addition, according to at least one embodiment of the present application, the forwarding of the downlink data between the fourteenth network function and the core server relies on the N6 tunnel.
此外,根据本申请的至少一个实施例,所述N6隧道的建立是依靠本地网络配置生成的。In addition, according to at least one embodiment of the present application, the establishment of the N6 tunnel is generated by relying on local network configuration.
此外,根据本申请的至少一个实施例,所述第十三网络功能为本地PSA UPF;所述第十四网络功能为核心PSA UPF。In addition, according to at least one embodiment of the present application, the thirteenth network function is a local PSA UPF; the fourteenth network function is a core PSA UPF.
本申请的至少一个实施例提供一种信息交互方法,所述方法包括:At least one embodiment of the present application provides an information interaction method, the method comprising:
第十五网络功能接收第十六网络功能发送的第十信息。The fifteenth network function receives the tenth information sent by the sixteenth network function.
此外,根据本申请的至少一个实施例,所述第十信息是核心服务器发送给所述第十六网络功能的下行数据;In addition, according to at least one embodiment of the present application, the tenth information is downlink data sent by the core server to the sixteenth network function;
所述第十六网络功能根据数据包处理指示,将从所述本地服务器发送的所述下行数据,转发到隧道或通道,并发送至所述第十五网络功能。The sixteenth network function forwards the downlink data sent from the local server to a tunnel or channel according to the data packet processing instruction, and sends it to the fifteenth network function.
此外,根据本申请的至少一个实施例,所述数据包处理指示为所述第十六网络功能接收的SMF配置的信息。In addition, according to at least one embodiment of the present application, the packet processing indication is information of the SMF configuration received by the sixteenth network function.
此外,根据本申请的至少一个实施例,所述隧道或通道为所述第十六网络功能和所述第十五网络功能之间传输数据的隧道或通道;In addition, according to at least one embodiment of the present application, the tunnel or channel is a tunnel or channel for transmitting data between the sixteenth network function and the fifteenth network function;
所述隧道或通道的建立是依靠本地网络配置生成的。The establishment of the tunnel or channel is generated based on the local network configuration.
此外,根据本申请的至少一个实施例,所述下行数据在所述第十六网络功能和所述本地服务器之间的转发依靠N6隧道。In addition, according to at least one embodiment of the present application, forwarding of the downlink data between the sixteenth network function and the local server relies on the N6 tunnel.
此外,根据本申请的至少一个实施例,所述N6隧道的建立是依靠本地网络配置生成的。In addition, according to at least one embodiment of the present application, the establishment of the N6 tunnel is generated by relying on local network configuration.
此外,根据本申请的至少一个实施例,所述第十五网络功能为核心PSA UPF;所述第十六网络功能为本地PSA UPF。In addition, according to at least one embodiment of the present application, the fifteenth network function is a core PSA UPF; the sixteenth network function is a local PSA UPF.
本申请的至少一个实施例提供一种信息交互装置,包括:At least one embodiment of the present application provides an information interaction device, including:
处理单元,用于通过第一网络功能,访问第二网络功能。The processing unit is used to access the second network function through the first network function.
本申请的至少一个实施例提供一种信息交互装置,包括:At least one embodiment of the present application provides an information interaction device, including:
第一接收单元,用于接收第五网络功能发送的第五信息。The first receiving unit is configured to receive fifth information sent by a fifth network function.
本申请的至少一个实施例提供一种信息交互装置,包括:At least one embodiment of the present application provides an information interaction device, including:
第二接收单元,用于接收第八网络功能发送的第七信息。The second receiving unit is used to receive seventh information sent by the eighth network function.
本申请的至少一个实施例提供一种信息交互装置,包括:At least one embodiment of the present application provides an information interaction device, including:
第三接收单元,用于接收第十一网络功能发送的第八信息。The third receiving unit is used to receive the eighth information sent by the eleventh network function.
本申请的至少一个实施例提供一种信息交互装置,包括:At least one embodiment of the present application provides an information interaction device, including:
第四接收单元,用于接收第十四网络功能发送的第九信息。The fourth receiving unit is used to receive ninth information sent by the fourteenth network function.
本申请的至少一个实施例提供一种信息交互装置,包括:At least one embodiment of the present application provides an information interaction device, including:
第五接收单元,用于接收第十六网络功能发送的第十信息。The fifth receiving unit is used to receive the tenth information sent by the sixteenth network function.
本申请的至少一个实施例提供一种终端,包括处理器和用于存储能够在处理器上运行的计算机程序的存储器,At least one embodiment of the present application provides a terminal, including a processor and a memory for storing a computer program that can be run on the processor.
其中,所述处理器用于运行所述计算机程序时,执行上述终端侧任一项所述方法的步骤。Wherein, when the processor is used to run the computer program, it executes the steps of any one of the methods described above on the terminal side.
本申请的至少一个实施例提供一种网络设备,包括处理器和用于存储能够在处理器上运行的计算机程序的存储器,At least one embodiment of the present application provides a network device, including a processor and a memory for storing a computer program that can be run on the processor.
其中,所述处理器用于运行所述计算机程序时,执行上述网络设备侧任一项所述方法的步骤。Wherein, when the processor is used to run the computer program, it executes the steps of any one of the methods described above on the network device side.
本申请实施例提供的信息交互方法、装置、设备及存储介质,终端通过第一网络功能,访问第二网络功能。采用本申请实施例提供的技术方案,所述终端通过第一网络功能,访问第二网络功能,以使所述第二网络功能向所述终端提供服务。也就是说,本申请实施例可以实现并完善所述终端对第二网络功能服务的调用。The information interaction method, device, equipment and storage medium provided in the embodiments of the present application, the terminal accesses the second network function through the first network function. Using the technical solution provided in the embodiments of the present application, the terminal accesses the second network function through the first network function, so that the second network function provides services to the terminal. In other words, the embodiments of the present application can realize and improve the call of the second network function service by the terminal.
图1是本申请实施例信息交互方法的实现流程示意图一;FIG1 is a schematic diagram of a first implementation flow of an information interaction method according to an embodiment of the present application;
图2是本申请实施例信息交互方法的具体实现流程示意图一; FIG2 is a schematic diagram of a specific implementation flow of the information interaction method according to an embodiment of the present application;
图3是本申请实施例信息交互方法的具体实现流程示意图二;FIG3 is a second schematic diagram of a specific implementation flow of the information interaction method according to an embodiment of the present application;
图4是本申请实施例信息交互方法的具体实现流程示意图三;FIG4 is a schematic diagram of a third specific implementation flow of the information interaction method according to an embodiment of the present application;
图5是本申请实施例UE通过UPF访问NEF的示意图;FIG5 is a schematic diagram of a UE accessing a NEF through a UPF according to an embodiment of the present application;
图6是本申请实施例UE通过AMF和SMF访问NEF的示意图;FIG6 is a schematic diagram of a UE accessing a NEF through an AMF and an SMF according to an embodiment of the present application;
图7是本申请实施例信息交互方法的实现流程示意图二;FIG7 is a second schematic diagram of the implementation flow of the information interaction method according to an embodiment of the present application;
图8是本申请实施例信息交互方法的具体实现流程示意图四;FIG8 is a fourth schematic diagram of a specific implementation flow of the information interaction method according to an embodiment of the present application;
图9是本申请实施例信息交互方法的具体实现流程示意图五;FIG9 is a schematic diagram of a specific implementation flow of the information interaction method according to an embodiment of the present application;
图10a是本申请实施例建立的隧道的示意图一;FIG10 a is a schematic diagram 1 of a tunnel established in an embodiment of the present application;
图10b是本申请实施例建立的隧道的示意图二;FIG10 b is a second schematic diagram of a tunnel established in an embodiment of the present application;
图11是本申请实施例信息交互装置的组成结构示意图一;FIG11 is a schematic diagram of the first structure of the information interaction device according to an embodiment of the present application;
图12是本申请实施例信息交互装置的组成结构示意图二;FIG12 is a second schematic diagram of the structure of the information interaction device according to an embodiment of the present application;
图13是本申请实施例终端的组成结构示意图;FIG13 is a schematic diagram of the structure of a terminal according to an embodiment of the present application;
图14是本申请实施例网络设备的组成结构示意图。FIG. 14 is a schematic diagram of the composition structure of the network device according to an embodiment of the present application.
在对本申请实施例的技术方案进行介绍之前,先对相关技术进行说明。Before introducing the technical solutions of the embodiments of the present application, the related technologies are first explained.
考虑到现在的网络中,通常是应用调用NEF的服务,AF获得NEF的API接口之后,去通用的API开放框架(CAPIF,Common API Framework for 3GPP Northbound APIs)注册,从而获得NEF的授权。例如,运营商和第三方通过做SLA的线下协议来授权,将第三方应用的身份证明信息(如app ID)提前通知给NEF,并部署在CAPIF上。当应用需要调用NEF服务时,需要携带这些鉴权信息,才能调用CAPIF的信息。但是,当UE通过AF做HTTP 302重定向调用NEF服务时,应用提供商无法知道UE的身份信息,需要研究CAPIF如何对UE授权,使UE可以调用NEF的服务。Considering that in the current network, applications usually call NEF services. After AF obtains NEF's API interface, it registers with the Common API Framework for 3GPP Northbound APIs (CAPIF) to obtain NEF's authorization. For example, operators and third parties authorize through offline SLA agreements, notify NEF of the third-party application's identity information (such as app ID) in advance, and deploy it on CAPIF. When an application needs to call NEF services, it needs to carry this authentication information to call CAPIF's information. However, when UE calls NEF services through AF's HTTP 302 redirection, the application provider cannot know the UE's identity information, and it is necessary to study how CAPIF authorizes the UE so that the UE can call NEF services.
综上所述,在现有方案中,只支持NEF对AF访问的授权,而不支持NEF对UE访问的授权。为了支持UE调用NEF服务,一方面需要NEF能够判定请求来自UE并做出相应,另一方面需要对UE的身份做鉴权和授权认证。相关技术中,都没有提及这两个方面的内容。In summary, in the existing solution, only NEF supports authorization of AF access, but not NEF authorization of UE access. In order to support UE to call NEF services, on the one hand, NEF needs to be able to determine that the request comes from UE and respond accordingly, and on the other hand, it needs to authenticate the identity of UE and authorize authentication. These two aspects are not mentioned in the relevant technology.
基于此,本申请实施例中,终端通过第一网络功能,访问第二网络功能。Based on this, in an embodiment of the present application, the terminal accesses the second network function through the first network function.
另外,考虑到在边缘部署云服务器的场景中,例如云手机、AR/VR眼镜, 端侧的UE可以直接向云端服务器发起服务请求。此时的AS不是单纯的业务服务器,是一个可以处理UE服务请求的代理服务器。因此,UE可以通过直接访问AS请求调用NEF的服务。在调用NEF服务之后,AS还可以通过NEF下向PCF发送相关信息,以供PCF实现隧道配置等。In addition, considering the scenarios where cloud servers are deployed at the edge, such as cloud phones and AR/VR glasses, The UE on the end side can directly initiate a service request to the cloud server. At this time, the AS is not a simple business server, but a proxy server that can process UE service requests. Therefore, the UE can directly access the AS request to call the NEF service. After calling the NEF service, the AS can also send relevant information to the PCF through the NEF for the PCF to implement tunnel configuration, etc.
基于此,本申请实施例中,第四网络功能接收第五网络功能发送的第五信息。Based on this, in the embodiment of the present application, the fourth network function receives the fifth information sent by the fifth network function.
图1是本申请实施例信息交互方法的实现流程示意图,如图1所示,所述方法包括步骤101:FIG. 1 is a schematic diagram of an implementation flow of an information interaction method according to an embodiment of the present application. As shown in FIG. 1 , the method includes step 101:
步骤101:终端通过第一网络功能,访问第二网络功能。Step 101: A terminal accesses a second network function through a first network function.
在一实施例中,所述第一网络功能包括以下之一:AF、UPF、AMF;所述第二网络功能为NEF。In one embodiment, the first network function includes one of the following: AF, UPF, AMF; the second network function is NEF.
考虑到在实际应用时,所述终端可以从所述第一网络功能获取所述第二网络功能授权所述终端访问的第一信息,如此,所述终端利用所述第一信息,实现访问所述第二网络功能。Considering that in actual application, the terminal can obtain the first information authorized by the second network function to access the terminal from the first network function, so that the terminal uses the first information to access the second network function.
基于此,在一实施例中,所述终端通过第一网络功能,访问第二网络功能,包括:Based on this, in one embodiment, the terminal accesses the second network function through the first network function, including:
接收所述第一网络功能发送的第一信息;所述第一信息用于所述终端请求所述第二网络功能授权访问;receiving first information sent by the first network function; the first information is used by the terminal to request the second network function to authorize access;
基于所述第一信息,访问所述第二网络功能。Based on the first information, the second network function is accessed.
在一实施例中,所述第一信息,包括以下至少之一:In one embodiment, the first information includes at least one of the following:
所述第二网络功能的URI;the URI of the second network function;
S-NSSAI;S-NSSAI;
DNN;DNN;
FQDN;FQDN;
IP五元组;IP quintuple;
应用标识;Application identification;
流描述信息;Stream description information;
GPSI。GPSI.
下面分情况详细描述所述终端通过第一网络功能访问第二网络功能的过 程。The following describes in detail the process of the terminal accessing the second network function through the first network function according to different situations. Procedure.
第一种情况,考虑到在实际应用时,在所述第一网络功能为AF、所述第二网络功能为NEF的情况下,AF可以基于所述所述终端的签约数据中用于对所述终端进行鉴权的鉴权信息生成第一信息,其中,所述鉴权信息也可以是认证信息,也可以是authorization,如此,所述终端可以基于所述第一信息请求NEF的授权访问。In the first case, considering that in actual application, when the first network function is AF and the second network function is NEF, AF can generate first information based on the authentication information in the contract data of the terminal for authenticating the terminal, wherein the authentication information can also be authentication information or authorization, so that the terminal can request authorized access from NEF based on the first information.
基于此,在一实施例中,所述终端通过第一网络功能,访问第二网络功能,包括:Based on this, in one embodiment, the terminal accesses the second network function through the first network function, including:
在建立会话过程中,获取签约数据;During the session establishment process, the contract signing data is obtained;
向所述第一网络功能发送第一请求;所述第一请求用于请求调用所述第一网络功能的服务;所述第一请求携带有所述签约数据;Sending a first request to the first network function; the first request is used to request to call a service of the first network function; the first request carries the subscription data;
接收所述第一网络功能返回的第一信息;所述第一信息是所述第一网络功能在确定向所述终端发起重定向的情况下基于所述签约数据确定的;receiving first information returned by the first network function; the first information is determined by the first network function based on the subscription data when determining to initiate redirection to the terminal;
基于所述第一信息,访问所述第二网络功能。Based on the first information, the second network function is accessed.
这里,所述第一网络功能为AF,所述第二网络功能为NEF。Here, the first network function is AF, and the second network function is NEF.
第二种情况,考虑到在实际应用时,在所述第一网络功能为AF、所述第二网络功能为NEF的情况下,可以在AF本地预先配置第二信息;所述第二信息表征NEF授权访问的UE信息,AF基于本地预先配置的所述第二信息生成第一信息,如此,所述终端可以基于所述第一信息请求NEF的授权访问。In the second case, considering that in actual application, when the first network function is AF and the second network function is NEF, the second information can be pre-configured locally in the AF; the second information represents the UE information authorized to access by the NEF, and the AF generates the first information based on the second information pre-configured locally, so that the terminal can request authorized access from the NEF based on the first information.
基于此,在一实施例中,所述终端通过第一网络功能,访问第二网络功能,包括:Based on this, in one embodiment, the terminal accesses the second network function through the first network function, including:
向所述第一网络功能发送第二请求;所述第二请求用于请求调用所述第一网络功能的服务;Sending a second request to the first network function; the second request is used to request to call a service of the first network function;
接收所述第一网络功能返回的第一信息;所述第一信息是所述第一网络功能在确定向所述终端发起重定向的情况下基于预先配置在本地的第二信息确定的;receiving first information returned by the first network function; the first information is determined by the first network function based on second information pre-configured locally when determining to initiate redirection to the terminal;
基于所述第一信息,访问所述第二网络功能。Based on the first information, the second network function is accessed.
这里,所述预先配置在本地的第二信息是通过所述第一网络功能与所述第二网络功能交互,预先配置在所述第一网络功能上的。Here, the second information pre-configured locally is pre-configured on the first network function through interaction between the first network function and the second network function.
这里,所述第二信息表征所述第二网络功能授权访问的终端信息。 Here, the second information represents terminal information that the second network function is authorized to access.
这里,所述第一网络功能为AF,所述第二网络功能为NEF。Here, the first network function is AF, and the second network function is NEF.
这里,AF在触发对UE的重定向之前,AF与CAPIF(是指NEF)进行UE信息的交互,确定UE可以调用NEF的接口,也就是说,AF将所有在其上开户的UE信息注册到CAPIF上,实现NEF对这些UE的访问授权,并将所述第二信息配置在AF本地上。Here, before triggering the redirection of the UE, the AF interacts with the CAPIF (referring to the NEF) on UE information to determine that the UE can call the interface of the NEF. That is, the AF registers all UE information that has opened accounts on it to the CAPIF, implements the NEF's access authorization to these UEs, and configures the second information locally on the AF.
第三种情况,考虑到在实际应用时,在所述第一网络功能为UPF、所述第二网络功能为NEF的情况下,所述终端向UPF发送第三请求;所述第三请求携带第三信息;所述第三信息表征AF认证能够访问NEF的UE信息,UPF基于所述第三信息访问NEF,NEF通过UPF向所述终端返回第四信息,所述终端利用NEF返回的第四信息访问NEF;所述第四信息表征经NEF认证所述终端访问NEF的鉴权信息。The third situation, considering that in actual application, when the first network function is UPF and the second network function is NEF, the terminal sends a third request to UPF; the third request carries third information; the third information represents the UE information that can access NEF after AF authentication, UPF accesses NEF based on the third information, NEF returns fourth information to the terminal through UPF, and the terminal accesses NEF using the fourth information returned by NEF; the fourth information represents the authentication information of the terminal to access NEF after being authenticated by NEF.
基于此,在一实施例中,所述终端通过第一网络功能,访问第二网络功能,包括:Based on this, in one embodiment, the terminal accesses the second network function through the first network function, including:
接入RAN;Access RAN;
通过RAN与所述第一网络功能之间的N3接口,向所述第一网络功能发送第三请求;所述第三请求携带第三信息;Sending a third request to the first network function through an N3 interface between the RAN and the first network function; the third request carries third information;
其中,所述第一网络功能响应所述第三请求,通过N6接口绕行MEC DN,访问第二网络功能,或者,通过所述第一网络功能和所述第二网络功能之间的用户面隧道,访问所述第二网络功能。The first network function responds to the third request and accesses the second network function through the N6 interface bypassing the MEC DN, or accesses the second network function through a user plane tunnel between the first network function and the second network function.
这里,所述第一网络功能为UPF,所述第二网络功能为NEF。Here, the first network function is UPF, and the second network function is NEF.
这里,所述终端可以向AF发送服务请求;所述服务请求用于请求调用AF的服务;AF向所述终端返回所述第三信息;所述第三信息表征AF认证能够访问NEF的UE信息。Here, the terminal may send a service request to the AF; the service request is used to request to call the service of the AF; the AF returns the third information to the terminal; the third information represents the UE information that the AF authenticates and can access the NEF.
这里,所述第三信息,包括以下至少之一:Here, the third information includes at least one of the following:
UE ID;UE ID;
PDU ID;PDU ID;
S-NSSAI;S-NSSAI;
DNN。DNN.
这里,所述方法还包括:Here, the method further comprises:
所述终端接收所述第二网络功能返回的第四信息; The terminal receives fourth information returned by the second network function;
其中,所述第四信息是所述第二网络功能基于所述第三信息确定的,所述第四信息表征经所述第二网络功能认证所述终端访问所述第二网络功能的鉴权信息。The fourth information is determined by the second network function based on the third information, and the fourth information represents authentication information of the terminal authenticating access to the second network function by the second network function.
第四种情况,考虑到在实际应用时,在所述第一网络功能为AMF、所述第二网络功能为NEF的情况下,所述终端通过信令传输数据的方式访问NEF。In the fourth case, considering that in actual application, when the first network function is AMF and the second network function is NEF, the terminal accesses NEF by transmitting data through signaling.
基于此,在一实施例中,所述终端通过第一网络功能,访问第二网络功能,包括:Based on this, in one embodiment, the terminal accesses the second network function through the first network function, including:
向所述第一网络功能发送NAS消息;Sending a NAS message to the first network function;
其中,所述第一网络功能通过调用第三网络功能提供的服务接口,在所述第三网络功能上更新上下文;所述第三网络功能向所述第二网络功能发送第四请求,以访问所述第二网络功能;所述第四请求携带第三信息。The first network function updates the context on the third network function by calling a service interface provided by the third network function; the third network function sends a fourth request to the second network function to access the second network function; and the fourth request carries third information.
这里,所述第一网络功能为AMF,所述第二网络功能为NEF,所述第三网络功能为SMF。Here, the first network function is AMF, the second network function is NEF, and the third network function is SMF.
这里,在SMF更新上下文之后,SMF向NEF发送连接建立请求;所述连接建立请求携带第三信息;所述第三信息表征AF认证能够访问NEF的UE信息;NEF通过SMF、AMF,向所述终端返回授权信息,所述终端基于NEF返回的授权信息访问NEF。Here, after SMF updates the context, SMF sends a connection establishment request to NEF; the connection establishment request carries third information; the third information represents the UE information that AF authenticates and can access NEF; NEF returns authorization information to the terminal through SMF and AMF, and the terminal accesses NEF based on the authorization information returned by NEF.
这里,所述第三信息,包括以下至少之一:Here, the third information includes at least one of the following:
UE ID;UE ID;
PDU ID;PDU ID;
S-NSSAI;S-NSSAI;
DNN。DNN.
本申请实施例中,具备以下优点:In the embodiment of the present application, the following advantages are possessed:
(1)提出一种所述终端(UE)调用第二网络功能(NEF)服务的授权方案。具体地,所述终端通过第一网络功能,访问第二网络功能。也就是说,本申请实施例可以实现并完善UE对NEF服务的调用。(1) An authorization scheme for the terminal (UE) to call the second network function (NEF) service is proposed. Specifically, the terminal accesses the second network function through the first network function. That is, the embodiment of the present application can implement and improve the UE's call to the NEF service.
(2)可以实现UE基于重定向调用NEF的服务。(2) The UE can call the NEF service based on redirection.
图2是本申请实施例信息交互方法的具体实现流程示意图,如图2所示,所述方法包括步骤201至步骤204: FIG. 2 is a schematic diagram of a specific implementation flow of the information interaction method according to an embodiment of the present application. As shown in FIG. 2 , the method includes steps 201 to 204:
步骤201:终端(UE)在建立会话过程中,从核心网(5GC)获取签约数据。Step 201: During the session establishment process, the terminal (UE) obtains subscription data from the core network (5GC).
这里,所述签约数据包含对UE进行鉴权的鉴权信息。其中,所述鉴权信息也可以是认证信息,也可以是authorization。Here, the subscription data includes authentication information for authenticating the UE, wherein the authentication information may also be certification information or authorization.
步骤202:UE向第一网络功能(AF)发送第一请求;所述第一请求用于请求调用AF的服务;所述第一请求携带有所述签约数据。Step 202: The UE sends a first request to a first network function (AF); the first request is used to request to call a service of the AF; the first request carries the subscription data.
步骤203:当AF判断需要触发HTTP 302重定向时,AF向UE发送重定向通知消息;所述重定向通知消息携带第一信息;所述第一信息是AF基于所述签约数据确定的。Step 203: When AF determines that HTTP 302 redirection needs to be triggered, AF sends a redirection notification message to UE; the redirection notification message carries first information; the first information is determined by AF based on the contract data.
其中,所述第一信息包括以下至少之一:The first information includes at least one of the following:
NEF的URI;The URI of the NEF;
S-NSSAI;S-NSSAI;
DNN;DNN;
FQDN;FQDN;
IP五元组;IP quintuple;
应用标识(Application Identifier);Application Identifier;
流描述信息(flow description(s)information);flow description(s)information;
GPSI。GPSI.
步骤204:UE基于所述第一信息,向第二网络功能(NEF)发送服务调用请求。Step 204: The UE sends a service invocation request to a second network function (NEF) based on the first information.
例如,UE向NEF发送服务调用请求,以请求调用NEF的服务,该服务可以是检索UE ID,所述服务调用请求可以携带步骤201获取的鉴权信息和用户信息;其中,用户信息可以是UE的IPv6地址等。For example, the UE sends a service call request to the NEF to request to call the NEF's service, and the service may be to retrieve the UE ID. The service call request may carry the authentication information and user information obtained in step 201; wherein the user information may be the UE's IPv6 address, etc.
本示例中,具备以下优点:In this example, the following advantages are achieved:
(1)UE通过5GC获取签约数据,并利用AF返回的基于所述签约数据确定的第一信息请求调用NEF服务。(1) The UE obtains the subscription data through 5GC, and uses the first information returned by the AF and determined based on the subscription data to request to call the NEF service.
(2)UE基于重定向调用NEF的服务。(2) UE invokes NEF services based on redirection.
图3是本申请实施例信息交互方法的具体实现流程示意图,如图3所示,所述方法包括步骤301至步骤304: FIG3 is a schematic diagram of a specific implementation flow of the information interaction method according to an embodiment of the present application. As shown in FIG3 , the method includes steps 301 to 304:
步骤301:通过第一网络功能(AF)与第二网络功能(NEF)交互,将第二信息预先配置在AF本地上;所述第二信息表征NEF授权访问的终端(UE)信息。Step 301: Pre-configure second information locally on the AF through interaction between the first network function (AF) and the second network function (NEF); the second information represents information of the terminal (UE) that the NEF is authorized to access.
这里,AF在触发对UE的重定向之前,AF与CAPIF(是指NEF)进行UE信息的交互,确定UE可以调用NEF的接口,也就是说,AF将所有在其上开户的UE信息注册到CAPIF上,实现NEF对这些UE的访问授权,并将所述第二信息配置在AF本地上。Here, before triggering the redirection of the UE, the AF interacts with the CAPIF (referring to the NEF) on UE information to determine that the UE can call the interface of the NEF. That is, the AF registers all UE information that has opened accounts on it to the CAPIF, implements the NEF's access authorization to these UEs, and configures the second information locally on the AF.
这里,所述第二信息包括:Here, the second information includes:
NEF的统一资源标识符(URI,Uniform Resource Identifier);NEF’s Uniform Resource Identifier (URI);
和,and,
UE访问NEF的授权信息。Authorization information for UE to access NEF.
步骤302:UE向AF发送第二请求;所述第二请求用于请求AF的服务。Step 302: The UE sends a second request to the AF; the second request is used to request a service from the AF.
步骤303:当AF判断需要触发HTTP 302重定向时,AF向UE发送重定向通知消息;所述重定向通知消息携带有第一信息;所述第一信息是AF基于预先配置在本地的第二信息确定的。Step 303: When AF determines that HTTP 302 redirection needs to be triggered, AF sends a redirection notification message to UE; the redirection notification message carries first information; the first information is determined by AF based on second information pre-configured locally.
步骤304:UE基于所述第一信息,向NEF发起服务调用请求;所述服务调用请求携带有所述第二信息。Step 304: The UE initiates a service invocation request to the NEF based on the first information; the service invocation request carries the second information.
本示例中,具备以下优点:In this example, the following advantages are achieved:
(1)UE利用AF返回的基于在AF本地预配置的鉴权信息确定的第一信息请求调用NEF服务。(1) The UE uses the first information returned by the AF and determined based on the authentication information pre-configured locally in the AF to request to invoke the NEF service.
(2)UE基于重定向调用NEF的服务。(2) The UE invokes the NEF service based on the redirection.
图4是本申请实施例信息交互方法的具体实现流程示意图,如图4所示,所述方法包括步骤401至步骤405:FIG. 4 is a schematic diagram of a specific implementation flow of the information interaction method according to an embodiment of the present application. As shown in FIG. 4 , the method includes steps 401 to 405:
步骤401:终端(UE)向AF发送服务请求;所述服务请求用于请求AF的服务。Step 401: The terminal (UE) sends a service request to the AF; the service request is used to request the service of the AF.
步骤402:AF向UE发送响应消息;所述响应消息携带第三信息;所述第三信息表征AF认证能够访问第二网络功能(NEF)的UE信息。Step 402: The AF sends a response message to the UE; the response message carries third information; the third information represents the UE information that the AF authenticates and can access the second network function (NEF).
这里,当AF判断需要触发HTTP 302重定向时,AF授权UE调用NEF的服务,并对UE发送重定向通知消息;所述重定向通知消息携带第三信息。 Here, when the AF determines that HTTP 302 redirection needs to be triggered, the AF authorizes the UE to call the service of the NEF and sends a redirection notification message to the UE; the redirection notification message carries the third information.
其中,所述第三信息包括:The third information includes:
NEF的URI;The URI of the NEF;
和,and,
AF的鉴权信息(如授权码)。AF's authentication information (such as authorization code).
步骤403:UE通过UPF访问NEF,或者,通过AMF和SMF访问NEF。Step 403: The UE accesses the NEF through the UPF, or accesses the NEF through the AMF and SMF.
图5是本申请实施例UE通过UPF访问NEF的示意图,如图5所示,可以包括:FIG. 5 is a schematic diagram of a UE accessing a NEF through a UPF according to an embodiment of the present application. As shown in FIG. 5 , it may include:
步骤1,UE接入RAN,通过RAN与UPF的N3接口访问UPF,即,UE向UPF发送第三请求;所述第三请求携带所述第三信息;所述第三信息表征AF认证能够访问NEF的UE信息。Step 1, UE accesses RAN and accesses UPF through the N3 interface between RAN and UPF, that is, UE sends a third request to UPF; the third request carries the third information; the third information represents the UE information that AF authenticates and can access NEF.
这里,所述第三信息包括以下至少之一:Here, the third information includes at least one of the following:
UE ID;UE ID;
PDU会话ID;PDU session ID;
S-NSSAI;S-NSSAI;
DNN。DNN.
步骤2,UPF可以通过以下两种方式访问NEF。Step 2: UPF can access NEF in the following two ways.
第一种方式,UPF通过N6绕行MEC DN访问NEF。In the first method, UPF accesses NEF via N6 bypassing MEC DN.
第二种方式,在做C-IoT时,在UPF和NEF建立一条用户面隧道,UPF直接这条隧道访问NEF。The second method is to establish a user plane tunnel between UPF and NEF when doing C-IoT, and UPF directly accesses NEF through this tunnel.
图6是本申请实施例UE通过AMF和SMF访问NEF的示意图,如图6所示,可以包括:FIG. 6 is a schematic diagram of a UE accessing an NEF through an AMF and an SMF according to an embodiment of the present application. As shown in FIG. 6 , the following may be included:
步骤1,UE通过N1接口传递NAS消息给AMF。Step 1: UE transmits NAS message to AMF via N1 interface.
步骤2,AMF通过调用SMF提供的服务接口在SMF上更新上下文(update SM Context)。Step 2: AMF updates the context on SMF (update SM Context) by calling the service interface provided by SMF.
步骤3,SMF建立SMF-NEF连接,携带所述第三信息。Step 3: SMF establishes an SMF-NEF connection, carrying the third information.
这里,所述第三信息包括以下至少之一:Here, the third information includes at least one of the following:
UE ID;UE ID;
PDU会话ID;PDU session ID;
S-NSSAI;S-NSSAI;
DNN。 DNN.
步骤404:NEF对UE进行认证(authorization),并将NEF授权UE访问NEF的授权信息即第四信息发送给UE。Step 404: The NEF authenticates the UE and sends authorization information, that is, fourth information, to the UE.
这里,UE可以通过UPF接收NEF返回的第四信息,并基于所述第四信息访问NEF;其中,所述第四信息是NEF基于所述第三信息确定的,所述第四信息表征经NEF认证UE访问NEF的鉴权信息。Here, the UE may receive the fourth information returned by the NEF through the UPF, and access the NEF based on the fourth information; wherein the fourth information is determined by the NEF based on the third information, and the fourth information represents the authentication information of the UE authenticated by the NEF to access the NEF.
这里,UE还可以通过AMF-SMF-NEF路径接收NEF返回的第四信息,并基于所述第四信息访问NEF;其中,所述第四信息是NEF基于所述第三信息确定的,所述第四信息表征经NEF认证UE访问NEF的鉴权信息。Here, the UE can also receive the fourth information returned by the NEF through the AMF-SMF-NEF path, and access the NEF based on the fourth information; wherein the fourth information is determined by the NEF based on the third information, and the fourth information represents the authentication information of the UE authenticated by the NEF to access the NEF.
步骤405:UE向NEF发送服务请求;所述服务请求携带AF的鉴权/授权信息和NEF返回的授权信息。Step 405: The UE sends a service request to the NEF; the service request carries the authentication/authorization information of the AF and the authorization information returned by the NEF.
本示例中,具备以下优点:In this example, the following advantages are achieved:
(1)UE携带AF的认证信息在线请求NEF授权并请求调用NEF服务。(1) The UE carries the authentication information of the AF and requests online authorization from the NEF and calls the NEF service.
在这种方案中,NEF通过在线识别UE携带的AF认证信息对UE鉴权。In this solution, the NEF authenticates the UE by online identifying the AF authentication information carried by the UE.
(2)UE基于重定向调用NEF的服务。(2) UE invokes NEF services based on redirection.
(3)UE通过用户面UPF访问NEF。(3) UE accesses NEF through the user plane UPF.
(4)通过信令传输数据的方式访问NEF,类似二次鉴权的机制。也就是说,UE通过NAS消息以及AMF和SMF,访问NEF。(4) Accessing NEF by transmitting data through signaling, which is similar to the mechanism of secondary authentication. In other words, UE accesses NEF through NAS messages as well as AMF and SMF.
此外,考虑到在边缘部署云服务器的场景中,云手机、AR/VR眼镜等作为应用服务器不再是单纯的业务服务器(AS),是一个可以处理UE服务请求的代理服务器。UE可以通过直接访问云服务器请求业务。但是,现有方案中,UE在通过云服务器运行应用时,需要通过公共网络(Internet)获取业务数据,缺乏服务质量保障。如何在云服务器和DN之间保障业务服务质量,需要5GC管控云服务器(云应用)的数据转发路径。In addition, considering the scenario of deploying cloud servers at the edge, cloud phones, AR/VR glasses, etc. as application servers are no longer simple business servers (AS), but proxy servers that can process UE service requests. UE can request services by directly accessing the cloud server. However, in the existing solution, when UE runs applications through the cloud server, it needs to obtain business data through the public network (Internet), which lacks service quality assurance. How to ensure the service quality between the cloud server and the DN requires 5GC to control the data forwarding path of the cloud server (cloud application).
基于此,可以让UE直接访问AS请求调用NEF的服务,并通过NEF向PCF发送相关信息,以供PCF给SMF下发隧道配置和数据包转发策略。Based on this, the UE can directly access the AS to request to call the NEF service, and send relevant information to the PCF through the NEF, so that the PCF can send the tunnel configuration and data packet forwarding strategy to the SMF.
本申请实施例还提供一种信息交互方法,第四网络功能接收第五网络功能发送的第五信息。具体地,所述终端还可以通过所述第五网络功能访问所述第二网络功能,实现所述终端对所述第二网络功能服务的调用,进而可以实现所述第五网络功能通过第二网络功能向所述第四网络功能发送所述第五信息,以 供所述第四网络功能基于所述第五信息进行隧道配置和下发数据包转发策略等。The embodiment of the present application also provides an information interaction method, in which the fourth network function receives the fifth information sent by the fifth network function. Specifically, the terminal can also access the second network function through the fifth network function to implement the call of the second network function service by the terminal, and then the fifth network function can send the fifth information to the fourth network function through the second network function. The fourth network function is provided with tunnel configuration and packet forwarding strategy based on the fifth information.
图7是本申请实施例信息交互方法的实现流程示意图,如图7所示,所述方法包括步骤701:FIG. 7 is a schematic diagram of an implementation flow of an information interaction method according to an embodiment of the present application. As shown in FIG. 7 , the method includes step 701:
步骤701:第四网络功能接收第五网络功能发送的第五信息。Step 701: The fourth network function receives fifth information sent by the fifth network function.
这里,所述第五信息是在终端通过所述第五网络功能访问第二网络功能之后,所述第五网络功能通过所述第二网络功能向所述第四网络功能发送的。Here, the fifth information is sent by the fifth network function to the fourth network function through the second network function after the terminal accesses the second network function through the fifth network function.
在一实施例中,所述第四网络功能为PCF;所述第五网络功能为应用或应用服务器或业务或本地应用。In one embodiment, the fourth network function is a PCF; the fifth network function is an application or an application server or a service or a local application.
这里,应用功能(AF)/应用服务器(AS,Application Server)可以通过NEF给PCF发送第五信息。Here, the application function (AF)/application server (AS, Application Server) can send the fifth information to PCF through NEF.
这里,第五信息为AF/AS通过NEF向PCF发送的请求信息。Here, the fifth information is the request information sent by the AF/AS to the PCF through the NEF.
这里,终端可以通过所述第五网络功能访问第二网络功能,实现所述终端对所述第二网络功能服务的调用,进而可以实现所述第五网络功能通过第二网络功能向所述第四网络功能发送所述第五信息,以供所述第四网络功能基于所述第五信息进行配置等。其中,所述第二网络功能为NEF。Here, the terminal can access the second network function through the fifth network function to implement the terminal's call to the second network function service, and then the fifth network function can send the fifth information to the fourth network function through the second network function, so that the fourth network function can be configured based on the fifth information, etc. Among them, the second network function is NEF.
在一实施例中,所述第五信息包括:In one embodiment, the fifth information includes:
DNAI信息;DNAI information;
和/或,and/or,
在隧道或通道内传输的数据包信息;Packet information transmitted within a tunnel or channel;
和/或,and/or,
UE ID或UE标识。UE ID or UE identification.
这里,所述隧道或通道可以是节点粒度的隧道或通道。Here, the tunnel or channel may be a tunnel or channel at a node granularity.
在一实施例中,所述在隧道或通道内传输的数据包信息为IP三元组,所述IP三元组包括:In one embodiment, the data packet information transmitted in the tunnel or channel is an IP triplet, and the IP triplet includes:
本地服务器的IP地址;The IP address of the local server;
和/或,and/or,
核心服务器的IP地址;The IP address of the core server;
和/或,and/or,
协议; protocol;
在一实施例中,所述DNAI信息是一个或多个。In one embodiment, the DNAI information is one or more.
这里,IP三元组(也可以是3-tuple)包括本地服务器的IP地址,和/或核心服务器的IP地址,和/或协议。其中,本地服务器也可以是MEC server,也可以是local server,也可以是local DN,也可以是local part of DN,也可以是云端服务器,也可以是云手机。其中,核心服务器也可以是central DN,也可以是DN,也可以是central server。协议也可以是protocol,也可以是通信协议,也可以是协议类型。Here, the IP triplet (or 3-tuple) includes the IP address of the local server, and/or the IP address of the core server, and/or the protocol. The local server can also be a MEC server, a local server, a local DN, a local part of DN, a cloud server, or a cloud phone. The core server can also be a central DN, a DN, or a central server. The protocol can also be a protocol, a communication protocol, or a protocol type.
在一实施例中,所述方法还包括:In one embodiment, the method further comprises:
所述第四网络功能根据所述第五信息和/或本地网络策略生成第六信息,并发送给第六网络功能。The fourth network function generates sixth information according to the fifth information and/or the local network policy, and sends the sixth information to the sixth network function.
这里,所述本地网络策略为运营商配置策略和/或签约数据,也可以是本地策略,也可以是网络策略,所述签约数据可以指示该UE可使用云手机、AR/VR等云业务。Here, the local network policy is the operator configuration policy and/or contract data, which can also be a local policy or a network policy. The contract data can indicate that the UE can use cloud services such as cloud phones, AR/VR, etc.
在一实施例中,所述本地网络策略为运营商配置策略和/或签约数据;所述第六信息为网络策略。In one embodiment, the local network policy is an operator configuration policy and/or subscription data; and the sixth information is a network policy.
这里,所述第六信息具体可以是指策略和计费控制策略(PCC rule)。Here, the sixth information may specifically refer to the policy and charging control policy (PCC rule).
在一实施例中,所述第六网络功能根据所述第六信息中的DNAI信息选择合适的UPF,并配置相应的数据包处理指示。In one embodiment, the sixth network function selects a suitable UPF according to the DNAI information in the sixth information, and configures corresponding data packet processing instructions.
在一实施例中,所述UPF为本地PSA UPF,和/或UL CL UPF,和/或核心PSA UPF。In one embodiment, the UPF is a local PSA UPF, and/or a UL CL UPF, and/or a core PSA UPF.
这里,本地PSA UPF也可以是local PSA UPF,也可以是边缘PSA UPF,也可以是L-PSA UPF。Here, local PSA UPF can also be local PSA UPF, edge PSA UPF, or L-PSA UPF.
这里,UL CL UPF也可以是上行分流UPF,也可以是Uplink Classifier UPF,也可以是BP UPF,也可以是I-UPF。Here, UL CL UPF can also be the uplink diversion UPF, the Uplink Classifier UPF, the BP UPF, or the I-UPF.
这里,核心PSA UPF也可以是PSA UPF,也可以是central PSA UPF,也可以是C-PSA UPF。Here, core PSA UPF can also be PSA UPF, central PSA UPF, or C-PSA UPF.
这里,数据包处理指示也可以是packet handling instruction,也可以是数据转发规则,也可以是数据包检测规则(PDR,Packet Detection Rule),也可以是转发访问规则(FAR,Forwarding Action Rule)。Here, the packet handling instruction can also be a packet handling instruction, a data forwarding rule, a packet detection rule (PDR, Packet Detection Rule), or a forwarding access rule (FAR, Forwarding Action Rule).
在一实施例中,所述第六网络功能为SMF。 In one embodiment, the sixth network function is SMF.
本申请实施例,具备以下优点:The embodiment of the present application has the following advantages:
(1)所述终端还可以通过所述第五网络功能访问所述第二网络功能,实现所述终端对所述第二网络功能服务的调用,进而可以实现所述第五网络功能通过第二网络功能向所述第四网络功能发送所述第五信息,以供所述第四网络功能基于所述第五信息进行配置等。(1) The terminal may also access the second network function through the fifth network function, so as to implement the terminal's call of the second network function service, and further implement the fifth network function sending the fifth information to the fourth network function through the second network function, so that the fourth network function performs configuration based on the fifth information, etc.
图8是本申请实施例信息交互方法的具体实现流程示意图,如图8所示,所述方法包括步骤801至步骤802:FIG8 is a schematic diagram of a specific implementation flow of the information interaction method according to an embodiment of the present application. As shown in FIG8 , the method includes steps 801 to 802:
步骤801:第五网络功能(AS/AF)将DNAI 1、DNAI 2、DNAI 3发送给NEF,携带UE ID。Step 801: The fifth network function (AS/AF) sends DNAI 1, DNAI 2, and DNAI 3 to NEF, carrying UE ID.
步骤802:NEF将DNAI 1、DNAI 2和DNAI 3预配置在第四网络功能(PCF)中。Step 802: NEF preconfigures DNAI 1, DNAI 2 and DNAI 3 in the fourth network function (PCF).
这里,预配置DNAI:UE接入之前,AS/AF把边缘PSA UPF的DNAI(DNAI 2)、大区PSA UPF的DNAI(DNAI 1)和UL CL UPF的DNAI(DNAI 3)随UE ID发给NEF,NEF将其预配置在PCF中。Here, DNAI is pre-configured: before UE accesses, AS/AF sends the DNAI (DNAI 2) of the edge PSA UPF, the DNAI (DNAI 1) of the large area PSA UPF and the DNAI (DNAI 3) of the UL CL UPF to NEF along with the UE ID, and NEF pre-configures them in the PCF.
图9是本申请实施例信息交互方法的具体实现流程示意图,如图9所示,所述方法包括步骤901:FIG. 9 is a schematic diagram of a specific implementation flow of the information interaction method according to an embodiment of the present application. As shown in FIG. 9 , the method includes step 901:
步骤901:终端(UE)向第五网络功能(AS)发起服务请求。Step 901: The terminal (UE) initiates a service request to the fifth network function (AS).
步骤902:AS请求调用NEF服务。Step 902: AS requests to invoke NEF service.
步骤903:NEF请求PCF进行策略更新,配置PDR。Step 903: NEF requests PCF to update the policy and configure PDR.
这里,执行AF influence:UE接入网络到MEC server,触发了MEC server的激活,直接向云端服务器请求服务,触发服务请求流程UE-AS-AF-NEF-PCF。Here, AF influence is executed: UE accesses the network to the MEC server, triggering the activation of the MEC server, and directly requests services from the cloud server, triggering the service request process UE-AS-AF-NEF-PCF.
PCF发现该服务器是个云端服务器,预配置了DNAI(DNAI 1、DNAI 2、DNAI3)的信息,可以在连接状态下动态的做策略更新,让PCF配置N6-N9-N9的PDR(PDR 3)。PCF discovers that the server is a cloud server with pre-configured DNAI (DNAI 1, DNAI 2, DNAI3) information. It can dynamically update policies while connected, allowing PCF to configure PDR (PDR 3) for N6-N9-N9.
图10a是本申请实施例建立的隧道的示意图,如图10a所示,UE在会话建立过程中,SMF根据PCF下发的策略选择UPF,发现PCF配给SMF的PCC rule有三个DNAI,分别用于核心PSA UPF、UL CL UPF和本地PSA UPF的选择,以及会话建立时的隧道建立。 Figure 10a is a schematic diagram of the tunnel established by an embodiment of the present application. As shown in Figure 10a, during the session establishment process of the UE, the SMF selects the UPF according to the policy issued by the PCF, and finds that the PCC rule assigned by the PCF to the SMF has three DNAIs, which are used for the selection of the core PSA UPF, UL CL UPF and local PSA UPF, as well as the establishment of the tunnel when the session is established.
图10b是本申请实施例建立的隧道的示意图,如图10b所示,在核心PSA UPF和本地PSA UPF间新建隧道,可以不经过UL CL的转发。Figure 10b is a schematic diagram of the tunnel established in the embodiment of the present application. As shown in Figure 10b, a new tunnel is created between the core PSA UPF and the local PSA UPF without forwarding through the UL CL.
这里,PCF下发策略,给三套PDR定方向,新增N6-N9-N9的PDR(PDR 3)。当建立MEC server-边缘PSA UPF-UL CL UPF-核心PSA UPF-DN的流时,MEC server把自己的IP地址和目的IP地址(DN的IP地址)带在请求中,UPF识别到目的地址也是一个服务器,会触发N6-N9-N9的PDR(PDR 3)的执行。Here, PCF issues policies to set directions for the three sets of PDRs, adding a new PDR (PDR 3) for N6-N9-N9. When establishing the flow of MEC server-edge PSA UPF-UL CL UPF-core PSA UPF-DN, the MEC server includes its own IP address and the destination IP address (the IP address of DN) in the request. UPF recognizes that the destination address is also a server, which triggers the execution of the PDR (PDR 3) for N6-N9-N9.
在PCF给SMF下发隧道配置和数据包转发策略后,SMF根据策略向核心PSA UPF、UL CL UPF和本地PSA UPF分别配置数据包处理指示,实现数据包从DN到云服务器的有服务质量保障的数据传输。After PCF sends tunnel configuration and packet forwarding policy to SMF, SMF configures packet processing instructions to the core PSA UPF, UL CL UPF and local PSA UPF according to the policy, to achieve data transmission with quality of service guaranteed from DN to cloud server.
本申请实施例还提供一种信息交互方法,所述方法包括:The present application also provides an information interaction method, the method comprising:
第七网络功能接收第八网络功能发送的第七信息。The seventh network function receives the seventh information sent by the eighth network function.
在一实施例中,所述第七信息是核心服务器发送给所述第八网络功能的下行数据;In one embodiment, the seventh information is downlink data sent by the core server to the eighth network function;
所述第八网络功能根据数据包处理指示,将从所述核心服务器发送的所述下行数据,转发到隧道或通道,并发送至所述第七网络功能。The eighth network function forwards the downlink data sent from the core server to a tunnel or channel according to the data packet processing instruction, and sends it to the seventh network function.
这里,数据包处理指示也可以是packet handling instruction,也可以是数据转发规则,也可以是数据包检测规则(PDR,Packet Detection Rule),也可以是转发访问规则(FAR,Forwarding Action Rule)。Here, the packet handling instruction can also be a packet handling instruction, a data forwarding rule, a packet detection rule (PDR, Packet Detection Rule), or a forwarding access rule (FAR, Forwarding Action Rule).
在一实施例中,所述数据包处理指示为所述第八网络功能接收的SMF配置的信息。In one embodiment, the packet processing indication is information of the SMF configuration received by the eighth network function.
在一实施例中,所述隧道或通道为所述第八网络功能和所述第七网络功能之间传输数据的隧道或通道;In one embodiment, the tunnel or channel is a tunnel or channel for transmitting data between the eighth network function and the seventh network function;
所述隧道或通道的建立是依靠本地网络配置生成的。The establishment of the tunnel or channel is generated based on the local network configuration.
在一实施例中,所述第七网络功能根据数据包处理指示,将从所述第八网络功能发送的所述下行数据,转发到隧道或通道,并发送至第九网络功能。In one embodiment, the seventh network function forwards the downlink data sent from the eighth network function to a tunnel or channel according to the data packet processing instruction, and sends it to the ninth network function.
在一实施例中,所述第九网络功能为本地PSA UPF。In one embodiment, the ninth network function is a local PSA UPF.
这里,本地PSA UPF也可以是local PSA UPF,也可以是边缘PSA UPF,也可以是L-PSA UPF。Here, local PSA UPF can also be local PSA UPF, edge PSA UPF, or L-PSA UPF.
在一实施例中,所述隧道或通道为第八网络功能和第九网络功能之间传输 数据的隧道或通道。In one embodiment, the tunnel or channel is used for transmitting data between the eighth network function and the ninth network function. A tunnel or channel for data.
在一实施例中,所述数据包处理指示为所述第七网络功能接收的SMF配置的信息。In one embodiment, the packet processing indication is information of an SMF configuration received by the seventh network function.
在一实施例中,所述下行数据在所述第八网络功能和所述核心服务器之间的转发依靠N6隧道。In one embodiment, forwarding of the downlink data between the eighth network function and the core server relies on the N6 tunnel.
这里,所述N6隧道是指所述本地PSA UPF和所述本地服务器之间传输数据的隧道或通道。Here, the N6 tunnel refers to the tunnel or channel for transmitting data between the local PSA UPF and the local server.
在一实施例中,所述N6隧道的建立是依靠本地网络配置生成的。In one embodiment, the establishment of the N6 tunnel is generated based on the local network configuration.
在一实施例中,所述第七网络功能为UL CL UPF或I-UPF;所述第八网络功能为核心PSA UPF。In one embodiment, the seventh network function is UL CL UPF or I-UPF; the eighth network function is core PSA UPF.
这里,UL CL UPF也可以是上行分流UPF,也可以是Uplink Classifier UPF,也可以是BP UPF,也可以是I-UPF。Here, UL CL UPF can also be the uplink diversion UPF, the Uplink Classifier UPF, the BP UPF, or the I-UPF.
这里,核心PSA UPF也可以是PSA UPF,也可以是central PSA UPF,也可以是C-PSA UPF。Here, core PSA UPF can also be PSA UPF, central PSA UPF, or C-PSA UPF.
在PCF给SMF下发隧道配置和数据包转发策略后,SMF根据策略向核心PSA UPF、UL CL UPF和本地PSA UPF分别配置数据包处理指示,实现数据包从云服务器到DN的有服务质量保障的数据传输。本申请实施例还提供一种信息交互方法,所述方法包括:After the PCF sends the tunnel configuration and data packet forwarding strategy to the SMF, the SMF configures the data packet processing instructions to the core PSA UPF, UL CL UPF and local PSA UPF according to the strategy, so as to realize the data transmission with service quality guarantee from the cloud server to the DN. The embodiment of the present application also provides an information interaction method, which includes:
第十网络功能接收第十一网络功能发送的第八信息。The tenth network function receives the eighth information sent by the eleventh network function.
在一实施例中,所述第八信息是本地服务器发送给所述第十一网络功能的下行数据;In one embodiment, the eighth information is downlink data sent by the local server to the eleventh network function;
所述第十一网络功能根据数据包处理指示,将从所述本地服务器发送的所述下行数据,转发到隧道或通道,并发送至所述第十网络功能。The eleventh network function forwards the downlink data sent from the local server to a tunnel or channel according to the data packet processing instruction, and sends it to the tenth network function.
这里,数据包处理指示也可以是packet handling instruction,也可以是数据转发规则,也可以是数据包检测规则(PDR,Packet Detection Rule),也可以是转发访问规则(FAR,Forwarding Action Rule)。Here, the packet handling instruction can also be a packet handling instruction, a data forwarding rule, a packet detection rule (PDR, Packet Detection Rule), or a forwarding access rule (FAR, Forwarding Action Rule).
在一实施例中,所述数据包处理指示为所述第十一网络功能接收的SMF配置的信息。In one embodiment, the packet processing indication is information of an SMF configuration received by the eleventh network function.
在一实施例中,所述隧道或通道为所述第十一网络功能和所述第十网络功 能之间传输数据的隧道或通道;In one embodiment, the tunnel or channel is the eleventh network function and the tenth network function. A tunnel or channel that can transmit data between
所述隧道或通道的建立是依靠本地网络配置生成的。The establishment of the tunnel or channel is generated based on the local network configuration.
在一实施例中,所述第十网络功能根据数据包处理指示,将从所述第十一网络功能发送的所述下行数据,转发到隧道或通道,并发送至所述第十二网络功能。In one embodiment, the tenth network function forwards the downlink data sent from the eleventh network function to a tunnel or channel according to the data packet processing instruction, and sends it to the twelfth network function.
在一实施例中,所述第十二网络功能为核心PSA UPF。In one embodiment, the twelfth network function is a core PSA UPF.
这里,核心PSA UPF也可以是PSA UPF,也可以是central PSA UPF,也可以是C-PSA UPF。Here, core PSA UPF can also be PSA UPF, central PSA UPF, or C-PSA UPF.
在一实施例中,所述隧道或通道为所述第十一网络功能和所述第十二网络功能之间传输数据的隧道或通道。In one embodiment, the tunnel or channel is a tunnel or channel for transmitting data between the eleventh network function and the twelfth network function.
在一实施例中,所述数据包处理指示为所述第十网络功能接收的SMF配置的信息。In one embodiment, the packet processing indication is information configured for an SMF received by the tenth network function.
在一实施例中,所述下行数据在所述第十一网络功能和所述本地服务器之间的转发依靠N6隧道。In one embodiment, forwarding of the downlink data between the eleventh network function and the local server relies on an N6 tunnel.
这里,所述N6隧道是指所述本地PSA UPF和所述本地服务器之间传输数据的隧道或通道。Here, the N6 tunnel refers to the tunnel or channel for transmitting data between the local PSA UPF and the local server.
在一实施例中,所述N6隧道的建立是依靠本地网络配置生成的。In one embodiment, the establishment of the N6 tunnel is generated based on the local network configuration.
在一实施例中,所述第十网络功能为UL CL UPF或I-UPF;所述第十一网络功能为本地PSA UPF。In one embodiment, the tenth network function is UL CL UPF or I-UPF; the eleventh network function is a local PSA UPF.
为了在本地PSA UPF和核心PSA UPF之间直接建立隧道,不用通过UL CL UPF传输数据,实现数据包从DN到云服务器的有服务质量保障的数据传输,本申请实施例还提供一种信息交互方法,所述方法包括:In order to directly establish a tunnel between the local PSA UPF and the core PSA UPF, without transmitting data through the UL CL UPF, and to achieve data transmission with quality of service guarantee for data packets from the DN to the cloud server, the embodiment of the present application also provides an information interaction method, the method comprising:
第十三网络功能接收第十四网络功能发送的第九信息。The thirteenth network function receives the ninth information sent by the fourteenth network function.
在一实施例中,所述第九信息是核心服务器发送给所述第十四网络功能的下行数据;In one embodiment, the ninth information is downlink data sent by the core server to the fourteenth network function;
所述第十四网络功能根据数据包处理指示,将从所述核心服务器发送的所述下行数据,转发到隧道或通道,并发送至所述第十三网络功能。The fourteenth network function forwards the downlink data sent from the core server to a tunnel or channel according to the packet processing instruction, and sends it to the thirteenth network function.
在一实施例中,所述数据包处理指示为所述第十四网络功能接收的SMF配置的信息。 In one embodiment, the packet processing indication is information configured for an SMF received by the fourteenth network function.
这里,数据包处理指示也可以是packet handling instruction,也可以是数据转发规则,也可以是数据包检测规则(PDR,Packet Detection Rule),也可以是转发访问规则(FAR,Forwarding Action Rule)。Here, the packet handling instruction can also be a packet handling instruction, a data forwarding rule, a packet detection rule (PDR, Packet Detection Rule), or a forwarding access rule (FAR, Forwarding Action Rule).
在一实施例中,所述隧道或通道为所述第十四网络功能和所述第十三网络功能之间传输数据的隧道或通道;In one embodiment, the tunnel or channel is a tunnel or channel for transmitting data between the fourteenth network function and the thirteenth network function;
所述隧道或通道的建立是依靠本地网络配置生成的。The establishment of the tunnel or channel is generated based on the local network configuration.
在一实施例中,In one embodiment,
所述下行数据在所述第十四网络功能和所述核心服务器之间的转发依靠N6隧道。The forwarding of the downlink data between the fourteenth network function and the core server relies on the N6 tunnel.
这里,所述N6隧道是指所述本地PSA UPF和所述本地服务器之间传输数据的隧道或通道。Here, the N6 tunnel refers to the tunnel or channel for transmitting data between the local PSA UPF and the local server.
在一实施例中,所述N6隧道的建立是依靠本地网络配置生成的。In one embodiment, the establishment of the N6 tunnel is generated based on the local network configuration.
在一实施例中,所述第十三网络功能为本地PSA UPF;所述第十四网络功能为核心PSA UPF。In one embodiment, the thirteenth network function is a local PSA UPF; the fourteenth network function is a core PSA UPF.
这里,本地PSA UPF也可以是local PSA UPF,也可以是边缘PSA UPF,也可以是L-PSA UPF。Here, local PSA UPF can also be local PSA UPF, edge PSA UPF, or L-PSA UPF.
这里,核心PSA UPF也可以是PSA UPF,也可以是central PSA UPF,也可以是C-PSA UPF。Here, core PSA UPF can also be PSA UPF, central PSA UPF, or C-PSA UPF.
为了在本地PSA UPF和核心PSA UPF之间直接建立隧道,不用通过UL CL UPF传输数据,实现数据包从云服务器到DN的有服务质量保障的数据传输,本申请实施例还提供一种信息交互方法,所述方法包括:In order to directly establish a tunnel between the local PSA UPF and the core PSA UPF, without transmitting data through the UL CL UPF, and to achieve data transmission with quality of service guarantee for data packets from the cloud server to the DN, the embodiment of the present application also provides an information interaction method, the method comprising:
第十五网络功能接收第十六网络功能发送的第十信息。The fifteenth network function receives the tenth information sent by the sixteenth network function.
在一实施例中,所述第十信息是核心服务器发送给所述第十六网络功能的下行数据;In one embodiment, the tenth information is downlink data sent by the core server to the sixteenth network function;
所述第十六网络功能根据数据包处理指示,将从所述本地服务器发送的所述下行数据,转发到隧道或通道,并发送至所述第十五网络功能。The sixteenth network function forwards the downlink data sent from the local server to a tunnel or channel according to the data packet processing instruction, and sends it to the fifteenth network function.
这里,数据包处理指示也可以是packet handling instruction,也可以是数据转发规则,也可以是数据包检测规则(PDR,Packet Detection Rule),也可以是转发访问规则(FAR,Forwarding Action Rule)。 Here, the packet processing instruction may also be a packet handling instruction, a data forwarding rule, a packet detection rule (PDR), or a forwarding access rule (FAR).
在一实施例中,所述数据包处理指示为所述第十六网络功能接收的SMF配置的信息。In one embodiment, the packet processing indication is information configured for an SMF received by the sixteenth network function.
在一实施例中,所述隧道或通道为所述第十六网络功能和所述第十五网络功能之间传输数据的隧道或通道;In one embodiment, the tunnel or channel is a tunnel or channel for transmitting data between the sixteenth network function and the fifteenth network function;
所述隧道或通道的建立是依靠本地网络配置生成的。The establishment of the tunnel or channel is generated based on the local network configuration.
在一实施例中,所述下行数据在所述第十六网络功能和所述本地服务器之间的转发依靠N6隧道。In one embodiment, forwarding of the downlink data between the sixteenth network function and the local server relies on an N6 tunnel.
这里,所述N6隧道是指所述本地PSA UPF和所述本地服务器之间传输数据的隧道或通道。Here, the N6 tunnel refers to the tunnel or channel for transmitting data between the local PSA UPF and the local server.
在一实施例中,所述N6隧道的建立是依靠本地网络配置生成的。In one embodiment, the establishment of the N6 tunnel is generated based on the local network configuration.
在一实施例中,所述第十五网络功能为核心PSA UPF;所述第十六网络功能为本地PSA UPF。In one embodiment, the fifteenth network function is a core PSA UPF; the sixteenth network function is a local PSA UPF.
这里,本地PSA UPF也可以是local PSA UPF,也可以是边缘PSA UPF,也可以是L-PSA UPF。Here, local PSA UPF can also be local PSA UPF, edge PSA UPF, or L-PSA UPF.
这里,核心PSA UPF也可以是PSA UPF,也可以是central PSA UPF,也可以是C-PSA UPF。Here, core PSA UPF can also be PSA UPF, central PSA UPF, or C-PSA UPF.
为实现本申请实施例信息交互方法,本申请实施例还提供一种信息交互装置。图11为本申请实施例信息交互装置的组成结构示意图,如图11所示,所述装置包括:To implement the information interaction method of the embodiment of the present application, the embodiment of the present application also provides an information interaction device. FIG11 is a schematic diagram of the composition structure of the information interaction device of the embodiment of the present application. As shown in FIG11, the device includes:
处理单元111,用于通过第一网络功能,访问第二网络功能。The processing unit 111 is configured to access the second network function through the first network function.
在一实施例中,所述第一网络功能包括以下之一:AF、UPF、AMF;所述第二网络功能为NEF。In one embodiment, the first network function includes one of the following: AF, UPF, AMF; the second network function is NEF.
在一实施例中,所述处理单元111,用于:In one embodiment, the processing unit 111 is configured to:
接收所述第一网络功能发送的第一信息;所述第一信息用于所述终端请求所述第二网络功能授权访问;receiving first information sent by the first network function; the first information is used by the terminal to request the second network function to authorize access;
基于所述第一信息,访问所述第二网络功能。Based on the first information, the second network function is accessed.
在一实施例中,所述第一信息,包括以下至少之一:In one embodiment, the first information includes at least one of the following:
所述第二网络功能的URI;the URI of the second network function;
S-NSSAI; S-NSSAI;
DNN;DNN;
FQDN;FQDN;
IP五元组;IP quintuple;
应用标识;Application identification;
流描述信息;Stream description information;
GPSI。GPSI.
在一实施例中,所述处理单元111,用于:In one embodiment, the processing unit 111 is configured to:
在建立会话过程中,获取签约数据;During the session establishment process, the contract signing data is obtained;
向所述第一网络功能发送第一请求;所述第一请求用于请求调用所述第一网络功能的服务;所述第一请求携带有所述签约数据;Sending a first request to the first network function; the first request is used to request to call a service of the first network function; the first request carries the subscription data;
接收所述第一网络功能返回的第一信息;所述第一信息是所述第一网络功能在确定向所述终端发起重定向的情况下基于所述签约数据确定的;receiving first information returned by the first network function; the first information is determined by the first network function based on the subscription data when determining to initiate redirection to the terminal;
基于所述第一信息,访问所述第二网络功能。Based on the first information, the second network function is accessed.
在一实施例中,所述第一网络功能为AF,所述第二网络功能为NEF。In one embodiment, the first network function is AF, and the second network function is NEF.
在一实施例中,所述处理单元111,用于:In one embodiment, the processing unit 111 is configured to:
向所述第一网络功能发送第二请求;所述第二请求用于请求调用所述第一网络功能的服务;Sending a second request to the first network function; the second request is used to request to call a service of the first network function;
接收所述第一网络功能返回的第一信息;所述第一信息是所述第一网络功能在确定向所述终端发起重定向的情况下基于预先配置在本地的第二信息确定的;receiving first information returned by the first network function; the first information is determined by the first network function based on second information pre-configured locally when determining to initiate redirection to the terminal;
基于所述第一信息,访问所述第二网络功能。Based on the first information, the second network function is accessed.
在一实施例中,所述预先配置在本地的第二信息是通过所述第一网络功能与所述第二网络功能交互,预先配置在所述第一网络功能上的。In one embodiment, the second information pre-configured locally is pre-configured on the first network function through interaction between the first network function and the second network function.
在一实施例中,所述第一网络功能为AF,所述第二网络功能为NEF。In one embodiment, the first network function is AF, and the second network function is NEF.
在一实施例中,所述处理单元111,用于:In one embodiment, the processing unit 111 is configured to:
接入RAN;Access RAN;
通过RAN与所述第一网络功能之间的N3接口,向所述第一网络功能发送第三请求;所述第三请求携带第三信息;Sending a third request to the first network function through an N3 interface between the RAN and the first network function; the third request carries third information;
其中,所述第一网络功能响应所述第三请求,通过N6接口绕行MEC DN,访问第二网络功能,或者,通过所述第一网络功能和所述第二网络功能之间的 用户面隧道,访问所述第二网络功能。The first network function responds to the third request by bypassing the MEC DN through the N6 interface to access the second network function, or by connecting the first network function to the second network function. A user plane tunnel is used to access the second network function.
在一实施例中,所述第一网络功能为UPF,所述第二网络功能为NEF。In one embodiment, the first network function is UPF, and the second network function is NEF.
在一实施例中,所述处理单元111,用于:In one embodiment, the processing unit 111 is configured to:
向所述第一网络功能发送NAS消息;Sending a NAS message to the first network function;
其中,所述第一网络功能通过调用第三网络功能提供的服务接口,在所述第三网络功能上更新上下文;所述第三网络功能向所述第二网络功能发送第四请求,以访问所述第二网络功能;所述第四请求携带第三信息。The first network function updates the context on the third network function by calling a service interface provided by the third network function; the third network function sends a fourth request to the second network function to access the second network function; and the fourth request carries third information.
在一实施例中,所述第一网络功能为AMF,所述第二网络功能为NEF,所述第三网络功能为SMF。In one embodiment, the first network function is AMF, the second network function is NEF, and the third network function is SMF.
在一实施例中,所述装置还用于:In one embodiment, the device is further used for:
接收所述第二网络功能返回的第四信息;receiving fourth information returned by the second network function;
其中,所述第四信息是所述第二网络功能基于所述第三信息确定的,所述第四信息表征经所述第二网络功能认证所述终端访问所述第二网络功能的鉴权信息。The fourth information is determined by the second network function based on the third information, and the fourth information represents authentication information of the terminal authenticating access to the second network function by the second network function.
在一实施例中,所述第三信息,包括以下至少之一:In one embodiment, the third information includes at least one of the following:
UE ID;UE ID;
PDU会话ID;PDU session ID;
S-NSSAI;S-NSSAI;
DNN。DNN.
实际应用时,所述处理单元111可以由信息交互装置中的处理器实现。In actual application, the processing unit 111 can be implemented by a processor in the information interaction device.
需要说明的是:上述实施例提供的信息交互装置在进行访问时,仅以上述各程序模块的划分进行举例说明,实际应用中,可以根据需要而将上述处理分配由不同的程序模块完成,即将装置的内部结构划分成不同的程序模块,以完成以上描述的全部或者部分处理。另外,上述实施例提供的信息交互装置与信息交互方法实施例属于同一构思,其具体实现过程详见方法实施例,这里不再赘述。It should be noted that: the information interaction device provided in the above embodiment only uses the division of the above program modules as an example when accessing. In actual applications, the above processing can be assigned to different program modules as needed, that is, the internal structure of the device is divided into different program modules to complete all or part of the processing described above. In addition, the information interaction device provided in the above embodiment and the information interaction method embodiment belong to the same concept, and the specific implementation process is detailed in the method embodiment, which will not be repeated here.
为实现本申请实施例信息交互方法,本申请实施例还提供一种信息交互装置,设置在第四网络功能。图12为本申请实施例信息交互装置的组成结构示意图,如图12所示,所述装置包括: To implement the information interaction method of the embodiment of the present application, the embodiment of the present application also provides an information interaction device, which is set in the fourth network function. Figure 12 is a schematic diagram of the composition structure of the information interaction device of the embodiment of the present application. As shown in Figure 12, the device includes:
第一接收单元121,用于接收第五网络功能发送的第五信息。The first receiving unit 121 is configured to receive fifth information sent by a fifth network function.
在一实施例中,所述第五信息包括:In one embodiment, the fifth information includes:
DNAI信息;和/或,DNAI information; and/or,
在隧道或通道内传输的数据包信息;和/或,Data packets transmitted within a tunnel or channel; and/or,
UE ID或UE标识。UE ID or UE identification.
在一实施例中,所述隧道或通道可以是节点粒度的隧道或通道。In one embodiment, the tunnel or channel may be a tunnel or channel at a node granularity.
在一实施例中,所述在隧道或通道内传输的数据包信息为IP三元组,包括:In one embodiment, the data packet information transmitted in the tunnel or channel is an IP triplet, including:
本地服务器的IP地址;和/或,The IP address of the local server; and/or,
核心服务器的IP地址;和/或,The IP address of the core server; and/or,
协议;protocol;
所述DNAI是一个或多个。The DNAI is one or more.
这里,所述DNAI可以是一个或多个。Here, the DNAI may be one or more.
在一实施例中,所述方法还包括:In one embodiment, the method further comprises:
所述第四网络功能根据所述第五信息和/或本地网络策略生成第六信息,并发送给第六网络功能。The fourth network function generates sixth information according to the fifth information and/or the local network policy, and sends the sixth information to the sixth network function.
在一实施例中,所述本地网络网络策略为运营商配置策略和/或签约数据,所述签约数据可以指示该终端可使用云手机、AR/VR等云业务;所述第六信息为网络策略。In one embodiment, the local network policy is an operator configuration policy and/or contract data, and the contract data may indicate that the terminal can use cloud services such as cloud phones, AR/VR, etc.; the sixth information is the network policy.
在一实施例中,所述第六网络功能根据所述第六信息中的DNAI信息选择合适的UPF,并配置相应的数据包处理指示。In one embodiment, the sixth network function selects a suitable UPF according to the DNAI information in the sixth information, and configures corresponding data packet processing instructions.
在一实施例中,所述UPF为本地PDU会话锚点PSA UPF,和/或上行链路分类器UL CL UPF,和/或核心PSA UPF。In one embodiment, the UPF is a local PDU session anchor PSA UPF, and/or an uplink classifier UL CL UPF, and/or a core PSA UPF.
在一实施例中,所述第六网络功能为SMF。In one embodiment, the sixth network function is SMF.
在一实施例中,所述第四网络功能为PCF;所述第五网络功能为应用或应用服务器或业务或本地应用。In one embodiment, the fourth network function is a PCF; the fifth network function is an application or an application server or a service or a local application.
实际应用时,所述第一接收单元121可以由信息交互装置中的通信接口实现;所述处理单元可以由信息交互装置中的处理器实现。In actual application, the first receiving unit 121 can be implemented by a communication interface in the information interaction device; the processing unit can be implemented by a processor in the information interaction device.
需要说明的是:上述实施例提供的信息交互装置在进行信息交互时,仅以上述各程序模块的划分进行举例说明,实际应用中,可以根据需要而将上述处理分配由不同的程序模块完成,即将装置的内部结构划分成不同的程序模块, 以完成以上描述的全部或者部分处理。另外,上述实施例提供的信息交互装置与信息交互方法实施例属于同一构思,其具体实现过程详见方法实施例,这里不再赘述。It should be noted that: when the information interaction device provided in the above embodiment performs information interaction, only the division of the above program modules is used as an example for explanation. In actual applications, the above processing can be assigned to different program modules as needed, that is, the internal structure of the device can be divided into different program modules. In order to complete all or part of the above-described processing. In addition, the information interaction device and the information interaction method provided in the above embodiment belong to the same concept, and the specific implementation process is detailed in the method embodiment, which will not be repeated here.
为实现本申请实施例信息交互方法,本申请实施例还提供一种信息交互装置,设置在第七网络功能,所述装置包括:In order to implement the information interaction method of the embodiment of the present application, the embodiment of the present application further provides an information interaction device, which is set in the seventh network function, and the device includes:
第二接收单元,用于接收第八网络功能发送的第七信息。The second receiving unit is used to receive seventh information sent by the eighth network function.
在一实施例中,所述第七信息是核心服务器发送给所述第八网络功能的下行数据;In one embodiment, the seventh information is downlink data sent by the core server to the eighth network function;
所述第八网络功能根据数据包处理指示,将从所述核心服务器发送的所述下行数据,转发到隧道或通道,并发送至所述第七网络功能。The eighth network function forwards the downlink data sent from the core server to a tunnel or channel according to the data packet processing instruction, and sends it to the seventh network function.
在一实施例中,所述数据包处理指示为所述第八网络功能接收的SMF配置的信息。In one embodiment, the packet processing indication is information of the SMF configuration received by the eighth network function.
在一实施例中,所述隧道或通道为所述第八网络功能和所述第七网络功能之间传输数据的隧道或通道;In one embodiment, the tunnel or channel is a tunnel or channel for transmitting data between the eighth network function and the seventh network function;
所述隧道或通道的建立是依靠本地网络配置生成的。The establishment of the tunnel or channel is generated based on the local network configuration.
在一实施例中,所述装置用于:根据数据包处理指示,将从所述第八网络功能发送的所述下行数据,转发到隧道或通道,并发送至第九网络功能。In one embodiment, the device is used to: forward the downlink data sent from the eighth network function to a tunnel or channel according to the data packet processing instruction, and send it to the ninth network function.
在一实施例中,所述第九网络功能为本地PSA UPF。In one embodiment, the ninth network function is a local PSA UPF.
在一实施例中,所述隧道或通道为第八网络功能和第九网络功能之间传输数据的隧道或通道。In one embodiment, the tunnel or channel is a tunnel or channel for transmitting data between the eighth network function and the ninth network function.
在一实施例中,所述数据包处理指示为所述第七网络功能接收的SMF配置的信息。In one embodiment, the packet processing indication is information of an SMF configuration received by the seventh network function.
在一实施例中,所述下行数据在所述第八网络功能和所述核心服务器之间的转发依靠N6隧道。In one embodiment, forwarding of the downlink data between the eighth network function and the core server relies on the N6 tunnel.
在一实施例中,所述N6隧道的建立是依靠本地网络配置生成的。In one embodiment, the establishment of the N6 tunnel is generated based on the local network configuration.
在一实施例中,所述第七网络功能为UL CL UPF或I-UPF;所述第八网络功能为核心PSA UPF。 In one embodiment, the seventh network function is UL CL UPF or I-UPF; the eighth network function is core PSA UPF.
为实现本申请实施例信息交互方法,本申请实施例还提供一种信息交互装置,设置在第十网络功能,所述装置包括:In order to implement the information interaction method of the embodiment of the present application, the embodiment of the present application also provides an information interaction device, which is set in the tenth network function, and the device includes:
第三接收单元,用于接收第十一网络功能发送的第八信息。The third receiving unit is used to receive the eighth information sent by the eleventh network function.
在一实施例中,所述第八信息是本地服务器发送给所述第十一网络功能的下行数据;In one embodiment, the eighth information is downlink data sent by the local server to the eleventh network function;
所述第十一网络功能根据数据包处理指示,将从所述本地服务器发送的所述下行数据,转发到隧道或通道,并发送至所述第十网络功能。The eleventh network function forwards the downlink data sent from the local server to a tunnel or channel according to the data packet processing instruction, and sends it to the tenth network function.
在一实施例中,所述数据包处理指示为所述第十一网络功能接收的SMF配置的信息。In one embodiment, the packet processing indication is information of an SMF configuration received by the eleventh network function.
在一实施例中,所述隧道或通道为所述第十一网络功能和所述第十网络功能之间传输数据的隧道或通道;In one embodiment, the tunnel or channel is a tunnel or channel for transmitting data between the eleventh network function and the tenth network function;
所述隧道或通道的建立是依靠本地网络配置生成的。The establishment of the tunnel or channel is generated based on the local network configuration.
在一实施例中,所述装置用于:根据数据包处理指示,将从所述第十一网络功能发送的所述下行数据,转发到隧道或通道,并发送至所述第十二网络功能。In one embodiment, the device is used to: forward the downlink data sent from the eleventh network function to a tunnel or channel according to a data packet processing instruction, and send it to the twelfth network function.
在一实施例中,所述第十二网络功能为核心PSA UPF。In one embodiment, the twelfth network function is a core PSA UPF.
在一实施例中,所述隧道或通道为所述第十一网络功能和所述第十二网络功能之间传输数据的隧道或通道。In one embodiment, the tunnel or channel is a tunnel or channel for transmitting data between the eleventh network function and the twelfth network function.
在一实施例中,所述数据包处理指示为所述第十网络功能接收的SMF配置的信息。In one embodiment, the packet processing indication is information configured for an SMF received by the tenth network function.
在一实施例中,所述下行数据在所述第十一网络功能和所述本地服务器之间的转发依靠N6隧道。In one embodiment, forwarding of the downlink data between the eleventh network function and the local server relies on an N6 tunnel.
在一实施例中,所述N6隧道的建立是依靠本地网络配置生成的。In one embodiment, the establishment of the N6 tunnel is generated based on the local network configuration.
在一实施例中,所述第十网络功能为UL CL UPF或I-UPF;所述第十一网络功能为本地PSA UPF。In one embodiment, the tenth network function is UL CL UPF or I-UPF; the eleventh network function is a local PSA UPF.
为实现本申请实施例信息交互方法,本申请实施例还提供一种信息交互装置,设置在第十三网络功能,所述装置包括:In order to implement the information interaction method of the embodiment of the present application, the embodiment of the present application further provides an information interaction device, which is set in the thirteenth network function, and the device includes:
第四接收单元,用于接收第十四网络功能发送的第九信息。The fourth receiving unit is used to receive ninth information sent by the fourteenth network function.
在一实施例中,所述第九信息是核心服务器发送给所述第十四网络功能的 下行数据;In one embodiment, the ninth information is sent by the core server to the fourteenth network function. Downlink data;
所述第十四网络功能根据数据包处理指示,将从所述核心服务器发送的所述下行数据,转发到隧道或通道,并发送至所述第十三网络功能。The fourteenth network function forwards the downlink data sent from the core server to a tunnel or channel according to the packet processing instruction, and sends it to the thirteenth network function.
在一实施例中,所述数据包处理指示为所述第十四网络功能接收的SMF配置的信息。In one embodiment, the packet processing indication is information configured for an SMF received by the fourteenth network function.
在一实施例中,所述隧道或通道为所述第十四网络功能和所述第十三网络功能之间传输数据的隧道或通道;In one embodiment, the tunnel or channel is a tunnel or channel for transmitting data between the fourteenth network function and the thirteenth network function;
所述隧道或通道的建立是依靠本地网络配置生成的。The establishment of the tunnel or channel is generated based on the local network configuration.
在一实施例中,所述下行数据在所述第十四网络功能和所述核心服务器之间的转发依靠N6隧道。In one embodiment, forwarding of the downlink data between the fourteenth network function and the core server relies on the N6 tunnel.
在一实施例中,所述N6隧道的建立是依靠本地网络配置生成的。In one embodiment, the establishment of the N6 tunnel is generated based on the local network configuration.
在一实施例中,所述第十三网络功能为本地PSA UPF;所述第十四网络功能为核心PSA UPF。In one embodiment, the thirteenth network function is a local PSA UPF; the fourteenth network function is a core PSA UPF.
为实现本申请实施例信息交互方法,本申请实施例还提供一种信息交互装置,设置在第十五网络功能,所述装置包括:In order to implement the information interaction method of the embodiment of the present application, the embodiment of the present application also provides an information interaction device, which is set in the fifteenth network function, and the device includes:
第五接收单元,用于接收第十六网络功能发送的第十信息。The fifth receiving unit is used to receive the tenth information sent by the sixteenth network function.
在一实施例中,所述第十信息是核心服务器发送给所述第十六网络功能的下行数据;In one embodiment, the tenth information is downlink data sent by the core server to the sixteenth network function;
所述第十六网络功能根据数据包处理指示,将从所述本地服务器发送的所述下行数据,转发到隧道或通道,并发送至所述第十五网络功能。The sixteenth network function forwards the downlink data sent from the local server to a tunnel or channel according to the data packet processing instruction, and sends it to the fifteenth network function.
在一实施例中,所述数据包处理指示为所述第十六网络功能接收的SMF配置的信息。In one embodiment, the packet processing indication is information configured for an SMF received by the sixteenth network function.
在一实施例中,所述隧道或通道为所述第十六网络功能和所述第十五网络功能之间传输数据的隧道或通道;In one embodiment, the tunnel or channel is a tunnel or channel for transmitting data between the sixteenth network function and the fifteenth network function;
所述隧道或通道的建立是依靠本地网络配置生成的。The establishment of the tunnel or channel is generated based on the local network configuration.
在一实施例中,所述下行数据在所述第十六网络功能和所述本地服务器之间的转发依靠N6隧道。In one embodiment, forwarding of the downlink data between the sixteenth network function and the local server relies on an N6 tunnel.
在一实施例中,所述N6隧道的建立是依靠本地网络配置生成的。In one embodiment, the establishment of the N6 tunnel is generated based on the local network configuration.
在一实施例中,所述第十五网络功能为核心PSA UPF;所述第十六网络功 能为本地PSA UPF。In one embodiment, the fifteenth network function is a core PSA UPF; the sixteenth network function Can be a local PSA UPF.
本申请实施例还提供了一种终端,如图13所示,包括:The embodiment of the present application further provides a terminal, as shown in FIG13 , including:
第一通信接口131,能够与其它设备进行信息交互;The first communication interface 131 is capable of exchanging information with other devices;
第一处理器132,与所述第一通信接口131连接,用于运行计算机程序时,执行上述终端侧一个或多个技术方案提供的方法。而所述计算机程序存储在第一存储器133上。The first processor 132 is connected to the first communication interface 131 and is used to execute the method provided by one or more technical solutions on the terminal side when running a computer program. The computer program is stored in the first memory 133.
需要说明的是:所述第一处理器132和第一通信接口131的具体处理过程详见方法实施例,这里不再赘述。It should be noted that the specific processing process of the first processor 132 and the first communication interface 131 is detailed in the method embodiment and will not be repeated here.
当然,实际应用时,终端130中的各个组件通过总线系统134耦合在一起。可理解,总线系统134用于实现这些组件之间的连接通信。总线系统134除包括数据总线之外,还包括电源总线、控制总线和状态信号总线。但是为了清楚说明起见,在图13中将各种总线都标为总线系统134。Of course, in actual application, the various components in the terminal 130 are coupled together through the bus system 134. It is understandable that the bus system 134 is used to realize the connection and communication between these components. In addition to the data bus, the bus system 134 also includes a power bus, a control bus and a status signal bus. However, for the sake of clarity, various buses are marked as the bus system 134 in FIG. 13.
本申请实施例中的第一存储器133用于存储各种类型的数据以支持终端130的操作。这些数据的示例包括:用于在终端130上操作的任何计算机程序。The first memory 133 in the embodiment of the present application is used to store various types of data to support the operation of the terminal 130. Examples of such data include: any computer program used to operate on the terminal 130.
上述本申请实施例揭示的方法可以应用于所述第一处理器132中,或者由所述第一处理器132实现。所述第一处理器132可能是一种集成电路芯片,具有信号的处理能力。在实现过程中,上述方法的各步骤可以通过所述第一处理器132中的硬件的集成逻辑电路或者软件形式的指令完成。上述的所述第一处理器132可以是通用处理器、数字数据处理器(DSP,Digital Signal Processor),或者其他可编程逻辑器件、分立门或者晶体管逻辑器件、分立硬件组件等。所述第一处理器132可以实现或者执行本申请实施例中的公开的各方法、步骤及逻辑框图。通用处理器可以是微处理器或者任何常规的处理器等。结合本申请实施例所公开的方法的步骤,可以直接体现为硬件译码处理器执行完成,或者用译码处理器中的硬件及软件模块组合执行完成。软件模块可以位于存储介质中,该存储介质位于第一存储器133,所述第一处理器132读取第一存储器133中的信息,结合其硬件完成前述方法的步骤。The method disclosed in the above embodiment of the present application can be applied to the first processor 132, or implemented by the first processor 132. The first processor 132 may be an integrated circuit chip with signal processing capabilities. In the implementation process, each step of the above method can be completed by the hardware integrated logic circuit in the first processor 132 or the instruction in the form of software. The above first processor 132 may be a general processor, a digital data processor (DSP, Digital Signal Processor), or other programmable logic devices, discrete gates or transistor logic devices, discrete hardware components, etc. The first processor 132 can implement or execute the various methods, steps and logic block diagrams disclosed in the embodiment of the present application. The general processor may be a microprocessor or any conventional processor, etc. The steps of the method disclosed in the embodiment of the present application can be directly embodied as being executed by a hardware decoding processor, or being executed by a combination of hardware and software modules in the decoding processor. The software module may be located in a storage medium, which is located in the first memory 133. The first processor 132 reads the information in the first memory 133 and completes the steps of the above method in combination with its hardware.
本申请实施例还提供了一种网络设备,如图14所示,包括:The embodiment of the present application further provides a network device, as shown in FIG14 , including:
第二通信接口141,能够与其它设备进行信息交互;The second communication interface 141 is capable of exchanging information with other devices;
第二处理器142,与所述第二通信接口141连接,用于运行计算机程序时, 执行上述网络设备侧一个或多个技术方案提供的方法。而所述计算机程序存储在第二存储器143上。The second processor 142 is connected to the second communication interface 141 and is used to run the computer program. The method provided by one or more technical solutions on the network device side is executed. The computer program is stored in the second memory 143.
需要说明的是:所述第二处理器142和第二通信接口141的具体处理过程详见方法实施例,这里不再赘述。It should be noted that: the specific processing process of the second processor 142 and the second communication interface 141 is detailed in the method embodiment, which will not be repeated here.
当然,实际应用时,网络设备140中的各个组件通过总线系统144耦合在一起。可理解,总线系统144用于实现这些组件之间的连接通信。总线系统144除包括数据总线之外,还包括电源总线、控制总线和状态信号总线。但是为了清楚说明起见,在图14中将各种总线都标为总线系统144。Of course, in actual application, the various components in the network device 140 are coupled together through the bus system 144. It is understandable that the bus system 144 is used to realize the connection and communication between these components. In addition to the data bus, the bus system 144 also includes a power bus, a control bus and a status signal bus. However, for the sake of clarity, various buses are marked as the bus system 144 in Figure 14.
本申请实施例中的第二存储器143用于存储各种类型的数据以支持网络设备140的操作。这些数据的示例包括:用于在网络设备140上操作的任何计算机程序。The second memory 143 in the embodiment of the present application is used to store various types of data to support the operation of the network device 140. Examples of such data include: any computer program used to operate on the network device 140.
上述本申请实施例揭示的方法可以应用于所述第二处理器142中,或者由所述第二处理器142实现。所述第二处理器142可能是一种集成电路芯片,具有信号的处理能力。在实现过程中,上述方法的各步骤可以通过所述第二处理器142中的硬件的集成逻辑电路或者软件形式的指令完成。上述的所述第二处理器142可以是通用处理器、数字数据处理器(DSP,Digital Signal Processor),或者其他可编程逻辑器件、分立门或者晶体管逻辑器件、分立硬件组件等。所述第二处理器142可以实现或者执行本申请实施例中的公开的各方法、步骤及逻辑框图。通用处理器可以是微处理器或者任何常规的处理器等。结合本申请实施例所公开的方法的步骤,可以直接体现为硬件译码处理器执行完成,或者用译码处理器中的硬件及软件模块组合执行完成。软件模块可以位于存储介质中,该存储介质位于第二存储器143,所述第二处理器142读取第二存储器143中的信息,结合其硬件完成前述方法的步骤。The method disclosed in the above embodiment of the present application can be applied to the second processor 142, or implemented by the second processor 142. The second processor 142 may be an integrated circuit chip with signal processing capabilities. In the implementation process, each step of the above method can be completed by the hardware integrated logic circuit in the second processor 142 or the instruction in the form of software. The above second processor 142 may be a general processor, a digital data processor (DSP, Digital Signal Processor), or other programmable logic devices, discrete gates or transistor logic devices, discrete hardware components, etc. The second processor 142 can implement or execute the various methods, steps and logic block diagrams disclosed in the embodiment of the present application. The general processor may be a microprocessor or any conventional processor, etc. The steps of the method disclosed in the embodiment of the present application can be directly embodied as being executed by a hardware decoding processor, or being executed by a combination of hardware and software modules in the decoding processor. The software module can be located in a storage medium, which is located in the second memory 143. The second processor 142 reads the information in the second memory 143 and completes the steps of the above method in combination with its hardware.
在示例性实施例中,终端130、网络设备140可以被一个或多个应用专用集成电路(ASIC,Application Specific Integrated Circuit)、DSP、可编程逻辑器件(PLD,Programmable Logic Device)、复杂可编程逻辑器件(CPLD,Complex Programmable Logic Device)、现场可编程门阵列(FPGA,Field-Programmable Gate Array)、通用处理器、控制器、微控制器(MCU,Micro Controller Unit)、微处理器(Microprocessor)、或者其他电子元件实现,用于执行前述方法。 In an exemplary embodiment, the terminal 130 and the network device 140 may be implemented by one or more application specific integrated circuits (ASIC), DSP, programmable logic device (PLD), complex programmable logic device (CPLD), field programmable gate array (FPGA), general processor, controller, microcontroller (MCU), microprocessor, or other electronic components to execute the aforementioned method.
可以理解,本申请实施例的存储器(第一存储器133、第二存储器143)可以是易失性存储器或者非易失性存储器,也可包括易失性和非易失性存储器两者。其中,非易失性存储器可以是只读存储器(ROM,Read Only Memory)、可编程只读存储器(PROM,Programmable Read-Only Memory)、可擦除可编程只读存储器(EPROM,Erasable Programmable Read-Only Memory)、电可擦除可编程只读存储器(EEPROM,Electrically Erasable Programmable Read-Only Memory)、磁性随机存取存储器(FRAM,ferromagnetic random access memory)、快闪存储器(Flash Memory)、磁表面存储器、光盘、或只读光盘(CD-ROM,Compact Disc Read-Only Memory);磁表面存储器可以是磁盘存储器或磁带存储器。易失性存储器可以是随机存取存储器(RAM,Random Access Memory),其用作外部高速缓存。通过示例性但不是限制性说明,许多形式的RAM可用,例如静态随机存取存储器(SRAM,Static Random Access Memory)、同步静态随机存取存储器(SSRAM,Synchronous Static Random Access Memory)、动态随机存取存储器(DRAM,Dynamic Random Access Memory)、同步动态随机存取存储器(SDRAM,Synchronous Dynamic Random Access Memory)、双倍数据速率同步动态随机存取存储器(DDRSDRAM,Double Data Rate Synchronous Dynamic Random Access Memory)、增强型同步动态随机存取存储器(ESDRAM,Enhanced Synchronous Dynamic Random Access Memory)、同步连接动态随机存取存储器(SLDRAM,SyncLink Dynamic Random Access Memory)、直接内存总线随机存取存储器(DRRAM,Direct Rambus Random Access Memory)。本申请实施例描述的存储器旨在包括但不限于这些和任意其它适合类型的存储器。It can be understood that the memory (first memory 133, second memory 143) of the embodiment of the present application can be a volatile memory or a non-volatile memory, and can also include both volatile and non-volatile memories. Among them, the non-volatile memory can be a read-only memory (ROM), a programmable read-only memory (PROM), an erasable programmable read-only memory (EPROM), an electrically erasable programmable read-only memory (EEPROM), a magnetic random access memory (FRAM), a flash memory, a magnetic surface memory, an optical disc, or a compact disc read-only memory (CD-ROM); the magnetic surface memory can be a disk memory or a tape memory. Volatile memory can be random access memory (RAM), which is used as external cache. By way of example but not limitation, many forms of RAM are available, such as static random access memory (SRAM), synchronous static random access memory (SSRAM), dynamic random access memory (DRAM), synchronous dynamic random access memory (SDRAM), double data rate synchronous dynamic random access memory (DDRSDRAM), enhanced synchronous dynamic random access memory (ESDRAM), synchronous link dynamic random access memory (SLDRAM), direct memory bus random access memory (DRRAM). The memory described in the embodiments of the present application is intended to include, but is not limited to, these and any other suitable types of memory.
在示例性实施例中,本申请实施例还提供了一种存储介质,即计算机存储介质,具体为计算机可读存储介质,例如包括存储计算机程序的存储器,上述计算机程序可由终端130的第一处理器132执行,以完成前述终端侧方法所述步骤。计算机可读存储介质可以是FRAM、ROM、PROM、EPROM、EEPROM、Flash Memory、磁表面存储器、光盘、或CD-ROM等存储器。In an exemplary embodiment, the embodiment of the present application further provides a storage medium, namely a computer storage medium, specifically a computer-readable storage medium, for example, a memory storing a computer program, and the computer program can be executed by the first processor 132 of the terminal 130 to complete the steps described in the aforementioned terminal-side method. The computer-readable storage medium can be a memory such as FRAM, ROM, PROM, EPROM, EEPROM, Flash Memory, magnetic surface storage, optical disk, or CD-ROM.
需要说明的是:“第一”、“第二”等是用于区别类似的对象,而不必用于描述特定的顺序或先后次序。It should be noted that: "first", "second", etc. are used to distinguish similar objects, and are not necessarily used to describe a specific order or sequence.
另外,本申请实施例所记载的技术方案之间,在不冲突的情况下,可以任 意组合。In addition, the technical solutions described in the embodiments of the present application can be used in any manner without conflict. Intention combination.
以上所述,仅为本申请的较佳实施例而已,并非用于限定本申请的保护范围。 The above description is only a preferred embodiment of the present application and is not intended to limit the protection scope of the present application.
Claims (70)
Applications Claiming Priority (2)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| CN202310371164.4 | 2023-04-07 | ||
| CN202310371164.4A CN118785523A (en) | 2023-04-07 | 2023-04-07 | Information interaction method, device, equipment and storage medium |
Publications (1)
| Publication Number | Publication Date |
|---|---|
| WO2024208302A1 true WO2024208302A1 (en) | 2024-10-10 |
Family
ID=92971358
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| PCT/CN2024/085941 Pending WO2024208302A1 (en) | 2023-04-07 | 2024-04-03 | Information interaction method and apparatus, and device and storage medium |
Country Status (2)
| Country | Link |
|---|---|
| CN (1) | CN118785523A (en) |
| WO (1) | WO2024208302A1 (en) |
Citations (5)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN112314032A (en) * | 2018-06-22 | 2021-02-02 | 华为技术有限公司 | Optimize user device operation by making multiple policies conditional on information elements |
| CN114080056A (en) * | 2020-08-13 | 2022-02-22 | 中国移动通信有限公司研究院 | Session updating method, terminal and network side equipment |
| WO2022174921A1 (en) * | 2021-02-19 | 2022-08-25 | Lenovo (Singapore) Pte. Ltd. | Updating an application data set with n6-lan steering information |
| WO2022212252A1 (en) * | 2021-03-30 | 2022-10-06 | Innopeak Technology, Inc. | Apparatus and method of coordinating a reauthentication/reauthorization procedure for access to uncrewed aerial services |
| CN117280849A (en) * | 2023-08-09 | 2023-12-22 | 北京小米移动软件有限公司 | User plane connection establishment method and device, communication equipment, communication system and storage medium |
-
2023
- 2023-04-07 CN CN202310371164.4A patent/CN118785523A/en active Pending
-
2024
- 2024-04-03 WO PCT/CN2024/085941 patent/WO2024208302A1/en active Pending
Patent Citations (5)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN112314032A (en) * | 2018-06-22 | 2021-02-02 | 华为技术有限公司 | Optimize user device operation by making multiple policies conditional on information elements |
| CN114080056A (en) * | 2020-08-13 | 2022-02-22 | 中国移动通信有限公司研究院 | Session updating method, terminal and network side equipment |
| WO2022174921A1 (en) * | 2021-02-19 | 2022-08-25 | Lenovo (Singapore) Pte. Ltd. | Updating an application data set with n6-lan steering information |
| WO2022212252A1 (en) * | 2021-03-30 | 2022-10-06 | Innopeak Technology, Inc. | Apparatus and method of coordinating a reauthentication/reauthorization procedure for access to uncrewed aerial services |
| CN117280849A (en) * | 2023-08-09 | 2023-12-22 | 北京小米移动软件有限公司 | User plane connection establishment method and device, communication equipment, communication system and storage medium |
Also Published As
| Publication number | Publication date |
|---|---|
| CN118785523A (en) | 2024-10-15 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| US11895157B2 (en) | Network security management method, and apparatus | |
| JP7118237B2 (en) | Communication method and communication device | |
| CN113748699B (en) | Service authorization for indirect communication in a communication system | |
| KR101814969B1 (en) | Systems and methods for accessing a network | |
| JP4966432B2 (en) | Access via non-3GPP access network | |
| US20240073212A1 (en) | Communication method and apparatus | |
| US20210112411A1 (en) | Multi-factor authentication in private mobile networks | |
| JP2005525758A (en) | Method and system for performing preparation data transfer in a wireless communication system | |
| CN111742529B (en) | Security Negotiation in Service Based Architecture (SBA) | |
| US20250024261A1 (en) | Communication method and apparatus | |
| EP2317694B1 (en) | Method and system and user equipment for protocol configuration option transmission | |
| WO2021094349A1 (en) | Multi-step service authorization for indirect communication in a communication system | |
| WO2016180113A1 (en) | Method for initiating wi-fi voice service, lte communication device, terminal, and communication system | |
| WO2018170703A1 (en) | Connection establishment method and device | |
| WO2023011158A1 (en) | Certificate management method and apparatus | |
| CN117997541A (en) | Communication method and communication device | |
| WO2022151206A1 (en) | Communication method and network device | |
| US20230017260A1 (en) | Access control method and communications device | |
| WO2024208302A1 (en) | Information interaction method and apparatus, and device and storage medium | |
| WO2023216274A1 (en) | Key management method and apparatus, device, and storage medium | |
| WO2022067736A1 (en) | Communication method and apparatus | |
| CN116261137A (en) | Network element security authentication method and device, electronic equipment and storage medium | |
| CN116889004A (en) | Authentication indication for edge data network relocation | |
| WO2025232244A1 (en) | Authentication method and apparatus, and communication device, storage medium and computer program product | |
| WO2023169206A1 (en) | Authorization verification method and device |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| 121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 24784384 Country of ref document: EP Kind code of ref document: A1 |
|
| NENP | Non-entry into the national phase |
Ref country code: DE |