Detailed Description
The following description of the technical solutions in the embodiments of the present disclosure will be made clearly and completely with reference to the accompanying drawings in the embodiments of the present disclosure, and it is apparent that the described embodiments are only some embodiments of the present disclosure, not all embodiments. Based on the embodiments in this disclosure, all other embodiments that a person of ordinary skill in the art would obtain without making any inventive effort are within the scope of protection of this disclosure.
In the description of the present disclosure, unless otherwise indicated, "/" means "or" and, for example, a/B may mean a or B. The term "and/or" herein is merely an association relation describing the association object, and means that three kinds of relations may exist, for example, a and/or B may mean that a exists alone, a and B exist together, and B exists alone. Furthermore, "at least one" means one or more, and "a plurality" means two or more. The terms "first," "second," and the like do not limit the number and order of execution, and the terms "first," "second," and the like do not necessarily differ.
It is noted that in this disclosure, words such as "exemplary" or "such as" are used to mean serving as examples, illustrations, or descriptions. Any embodiment or design described herein as "exemplary" or "e.g." should not be taken as preferred or advantageous over other embodiments or designs. Rather, the use of words such as "exemplary" or "such as" is intended to present related concepts in a concrete fashion.
Rights include both rights and interests, and generally refer to roles that a particular principal is assigned to possess, as well as to the corresponding rights and benefits, and the like. For example, rights-related roles are manager, provider, user, witness, transactor, platform provider, etc. Rights corresponding to rights include ownership right, attribution right, modification right, processing right, incentive right, witness right, transaction right, security privacy right, allocation right, knowledge right and the like. Benefits corresponding to rights are rewarded, incentives earned, rewarded, divided, etc.
The network body in the network has corresponding rights and interests for providing services, using services, providing resources, using resources and other network activities, and the network body should also have rights and interests for obtaining security guarantee. Rights management of network main bodies in the network not only can promote fair competition of the network main bodies and strengthen cooperative trust, but also is beneficial to network stability and sustainable development.
The fifth generation mobile communication technology (5th generation wireless systems,5G) network provides only communication connection services, and the resources with commercial value are spectrum resources. Policy control function (policy control function, PCF) is used to provide policy and charging rules for control plane functions in the 5G network, and service control is granted to session management function (session management function, SMF) by formulating policy control and charging rules (PCC rules) AND CHARGING and by authorizing service data flows (SERVICE DATA flows, SDFs) in units of SDFs. But the PCC rules are only used for user access restriction, service control for quality of service guarantee, traffic statistics and traffic billing according to subscription information. It can be seen that the 5G framework has no explicit equity management mechanism and lacks equity policy rule interaction, which makes the behavior of the network body in the network lack equity guarantee, and the contribution of the network body to the network is difficult to reasonably report.
The 6G network provides communication, perception, calculation, intelligence, security, credibility and other multi-capability comprehensive services. Resources of commercial value in 6G networks include data resources, computing resources, and storage resources in addition to spectrum resources. These services and resources can both transact and change as assets, which can relate to commercial value transactions, as well as to validation issues. It can be seen that the current communication network lacks a perfect rights management mechanism, so that legal rights of a network main body are difficult to be fairly guaranteed.
In view of this, the disclosure proposes a rights management method, which includes a first network element configuring rights policy rules, the first network element sending the rights policy rules to a second network element, the rights policy rules being used for a rights control operation in a network by the first network element. The rights and interests are controlled through the transmission of the rights and interests policy rules, and the legal rights and interests of each network main body are defined. The rights control operation in the network is performed based on the rights policy rules, so that legal rights of all network main bodies are guaranteed, network fairness is maintained, initiative of network participants is further stimulated, and service experience and network value are improved.
The technical solution provided in the embodiments of the present disclosure may be applied to various mobile communication networks, for example, a New Radio (NR) mobile communication network using 5G, a future mobile communication network, or a multiple communication technology convergence system, etc., which is not limited in the embodiments of the present disclosure.
By way of example, fig. 1 provides an architectural diagram of a communication system for the present disclosure, as shown in fig. 1, a 5G network may include a terminal device (UE), a radio access network (radio access network, RAN) device, a user plane function (user plane function, UPF), an access and mobility management function (ASSESS AND mobility management, AMF), an authentication server function (authentication server function, AUSF), a network slice selection function (network slice selection function, NSSF), a network opening function (network exposure function, NEF), a network function storage function (network exposure function Repository Function, NRF), a unified data management function (unified DATA MANAGEMENT, UDM), a data warehouse function (unified data repository, UDR), an application function (application function, AF), or a billing function (charging function, CHF), etc.
As shown in fig. 1, the terminal device accesses to the 5G network through the RAN device, the terminal device communicates with the AMF through an N1 interface (abbreviated as N1), the RAN device communicates with the AMF through an N2 interface (abbreviated as N2), the RAN device communicates with the UPF through an N3 interface (abbreviated as N3), the SMF communicates with the UPF through an N4 interface (abbreviated as N4), and the UPF accesses to the data network through an N6 interface (abbreviated as N6). In addition, AUSF, AMF, SMF, NSSF, NEF, NRF, PCF, UDM, UDR, CHF or AF control plane functions shown in fig. 1 interact with each other using a service interface. For example, nausf serves interfaces for external provision of AUSF, namf serves interfaces for external provision of AMF, nsmf serves interfaces for external provision of SMF, nnssf serves interfaces for external provision of NSSF, nnef serves interfaces for external provision of NEF, nnrf serves interfaces for external provision of NRF, npcf serves interfaces for external provision of PCF, nudm serves interfaces for external provision of UDM, nudr serves interfaces for external provision of UDR, nchf serves interfaces for external provision of CHF, and Naf serves interfaces for external provision of AF.
In some embodiments, the terminal device may be a device with a wireless transceiver function, which may be deployed on land, including indoor or outdoor, handheld, wearable or vehicle-mounted, may be deployed on water (such as a ship, etc.), and may be deployed in air (such as an airplane, a balloon, a satellite, etc.). The terminals may be mobile phones (mobile phones), tablet computers (Pad), computers with wireless transceiving functionality, virtual Reality (VR) terminals, augmented reality (augmented reality, AR) terminals, wireless terminals in industrial control (industrial control), wireless terminals in unmanned (SELF DRIVING), wireless terminals in telemedicine (remote media), wireless terminals in smart grid (SMART GRID), wireless terminals in transportation security (transportation safety), wireless terminals in smart city (SMART CITY), wireless terminals in smart home (smart home), etc. Embodiments of the present disclosure are not limited to application scenarios. A terminal may also be referred to as a user, user equipment, access terminal, UE unit, UE station, mobile station, remote terminal, mobile device, UE terminal, wireless communication device, UE agent, UE device, or the like, as embodiments of the present disclosure are not limited in this respect.
The application scenario of the embodiments of the present disclosure is not limited. The system architecture and the service scenario described in the embodiments of the present disclosure are for more clearly describing the technical solutions of the embodiments of the present disclosure, and do not constitute a limitation on the technical solutions provided by the embodiments of the present disclosure, and those skilled in the art can know that, with the evolution of the network architecture and the appearance of a new service scenario, the technical solutions provided by the embodiments of the present disclosure are applicable to similar technical problems.
The embodiment of the disclosure provides a rights management method. As shown in fig. 2, the method comprises the steps of:
S101, the first network element configures right policy rules.
The rights policy rules are the basis for rights determination, rights division and network value transaction of the network body. Through the rights policy rules, it can be determined whether the network body is legal, which rights the network body has, and how the network body performs transactions.
In some embodiments, the equity is an equity of a network principal. Wherein the network principal qualifies for interest, or the network principal may correspond to a business principal having business activity in the network.
The equity may be, for example, the equity of the first network element, the equity of the second network element, the equity of the third network element, or the equity of other network elements in the network, or the equity of business entities corresponding to the first network element, the second network element, the third network element, or other network elements in the network. Business entities corresponding to other network elements in the network include device manufacturers, service providers, content providers, and the like.
For example, the equity policy rules correspond to legal regulations to define network principal equity qualification.
Optionally, the equity policy rules specify equity components of the network principal in correspondence with contractual agreements. Or the equity policy rule is one to more sets of equity-related information that can provide equity control parameters or equity support parameters. Or the equity policy rule contains one to more rules. Each rights policy rule contains a plurality of rights related information elements, such as rights policy rule identification, network rights principal identification, rights content owned by the network rights principal, and the like.
In some embodiments, the equity policy rules include at least one of equity principal policy rules, equity partitioning policy rules, equity transaction policy rules.
In some embodiments, the equity subject policy rules are used to ensure the legitimacy of subject equity in the network and prevent illegal or non-compliant subjects from obtaining equity, and the equity subject policy rules include at least one of subject qualification determination, subject legitimacy determination, legal regulations, contractual agreements, and subject identity identification.
In some embodiments, the equity partitioning policy rules are used to partition equity of a network principal, the equity partitioning policy rules including at least one of a attribution right of a resource, a modification right of a resource, a use right of a resource, an attribution right of an asset, a modification right of an asset, a use right of an asset, an attribution right of a service, a modification right of a service, a use right of a service, a network awareness right, a network modification right, an incentive to be obtained, a score to be obtained.
In some embodiments, the equity transaction policy rules are used to specify rules to be followed by both parties to the transaction during the transaction, and include at least one of third party proof, transaction platform, transaction period, whether the transaction may be revoked, scoring policy, ledger selection, whether privacy protection is required, and the degree of privacy protection.
It will be appreciated that the rights body management policies, rights partitioning policy rules, and rights transaction policy rules are not limited to including only the foregoing, but may include other than the foregoing, as this disclosure is not limited thereto.
In some embodiments, the equity policy rules include one or more equity-related information elements. For example, the equity policy rules include at least one of equity policy rule identification, equity policy rule index, equity policy rule type, equity principal identification, equity principal's equity.
In some embodiments, the first network element further comprises prior to configuring the benefit policy rule, the first network element making a decision of the benefit policy rule.
In some embodiments, the first network element makes a decision of the equity policy rule, including at least one of:
the first network element receives a first request message sent by the second network element, wherein the first request message is used for requesting to make a decision of a rights policy rule;
the first network element receives a second request message sent by the third network element, wherein the second request message is used for requesting to make a decision of the rights policy rule;
The first network element inquires the capability information of the third network element and makes a decision of the rights policy rule;
the first network element makes decisions of rights policy rules based on laws and regulations;
the first network element makes a decision of a rights policy rule based on contract signing information;
The first network element makes a decision of the equity policy rule based on the local information of the first network element.
The decision of the rights policy rule comprises at least one of rights policy rule analysis, rights policy rule generation, rights policy rule formulation and rights policy rule modification.
In some embodiments, the first network element is further configured to perform at least one of the following on the benefit policy rule:
the first network element downloads the rights and interests policy rules;
the first network element imports the rights and interests policy rules;
generating a right strategy rule by the first network element;
the first network element stores rights policy rules;
the first network element adds a rights policy rule;
the first network element deletes the rights and interests policy rules;
the first network element activates the rights and interests policy rule;
the first network element deactivates the equity policy rule;
the first network element modifies the rights and interests policy rules;
the first network element updates the equity policy rules.
It will be appreciated that the first network element may first make a benefit policy rule decision and reconfigure the benefit policy rule. The first network element may also directly configure the benefit policy rules without making a benefit policy rule decision, e.g., an operator or manager directly imports the benefit policy rules to the first network element (e.g., the first network element is a PCF).
S102, the first network element sends the right policy rules to the second network element, and the second network element receives the right policy rules sent by the first network element correspondingly.
The right policy rule is used for the second network element to perform right control operation in the network.
In order to ensure fairness and authority, the rights control operations for each network principal need to be implemented based on rights policy rules. The rights control operation enables each network principal to know the rights of itself and other network principal, create a fair network environment, and encourage each network principal to actively participate in network contribution.
In some embodiments, the first network element sending the benefit policy rule to the second network element comprises at least one of sending a first rule to the second network element, the first rule comprising a policy control and charging rule (PCC rule) of the benefit policy rule, sending a second rule to the second network element, the second rule comprising a dedicated benefit policy rule, and sending a third rule to the second network element, the third rule comprising a benefit policy rule information element. The first rule and the third rule may be the same or different, and the second rule and the third rule may be the same or different.
It will be appreciated that in the case where the first network element sends PCC rules to the second network element and the PCC rules include benefit policy rules, the second network element obtains the benefit policy rules by receiving the PCC rules. The first network element may also send other rules including the benefit policy rules to the second network element so that the second network element obtains the benefit policy rules. The first network element may also send only the benefit policy rules to the second network element, which are not included in the other rules. The first network element may send the equity policy rules as information elements to the second network element in various rule transmissions.
In some embodiments, before the second network element receives the benefit policy rule sent by the first network element, the method further comprises the step that the second network element sends a first request message to the first network element, wherein the first request message is used for requesting to make a decision of the benefit policy rule, or the second network element sends the first request message to the first network element based on a preset condition, and the first request message is used for requesting to make a decision of the benefit policy rule.
The first request message may also be referred to by other names, such as a rights policy rule request, a rights request, etc., which the present disclosure does not limit.
For example, the second network element discovers that a new benefit policy rule needs to be added, and the second network element sends a first request message to the first network element, where the first request message is used to request the first network element to add a benefit policy rule.
For another example, the second network element finds that the original rights policy rule is invalid, and the second network element sends a first request message, where the first request message is used to request the first network element to delete the original rights policy rule.
In some embodiments, the preset condition at least comprises at least one of session establishment, terminal context establishment, task establishment, satisfaction of a benefit trigger condition, determination of the benefit trigger condition according to monitoring of a benefit condition in the network, and reception of indication information of a third network element, wherein the indication information is used for indicating transmission of a first request message to the first network element. The indication information of the third network element comprises capability information of the third network element and/or resource request information of the third network element.
S103, the second network element performs rights control operation in the network based on the rights policy rules.
In some embodiments, the equity control operations include at least one of:
The second network element generates rights control parameters based on the rights policy rules;
the second network element activates the rights control parameters based on the rights policy rules;
the second network element binds the equity policy rule with a data stream based on the equity policy rule;
the second network element stores rights policy rules;
the second network element activates a rights policy rule based on the rights policy rule;
the second network element deactivates one of the equity policy rules based on the equity policy rule;
the second network element updates the locally stored rights policy rules;
the second network element modifies the locally stored equity policy rules;
the second network element selects a third network element based on the rights policy rules;
The second network element sends the right control parameter to the third network element;
The second network element generates a benefit configuration file based on the benefit policy rule, wherein the benefit configuration file comprises a benefit control parameter;
the second network element activates a benefit configuration file based on a benefit policy rule, the benefit configuration file including a benefit control parameter;
the second network element sends a benefit profile to the third network element, the benefit profile including benefit control parameters.
In some embodiments, the equity control parameters include at least one of equity principal identification, equity content parameters owned by equity principal, equity audit parameters, equity usage parameters, equity pre-warning parameters, equity transaction parameters.
Based on the control, the control of the rights and interests is carried out through the transmission of the rights and interests policy rules, and the legal rights and interests of each network main body are defined. The rights control operation in the network is performed based on the rights policy rules, so that legal rights of all network main bodies are guaranteed, network fairness is maintained, initiative of network participants is further stimulated, and service experience and network value are improved.
In some embodiments, the first network element receives feedback information of the equity policy rules sent by the second network element, and the first network element updates the equity policy rules based on the feedback information of the equity policy rules.
Exemplary, as shown in fig. 3, the embodiment of the present disclosure further provides a rights management method, including the following steps S201 and S202.
S201, the second network element sends the feedback information of the right policy rule to the first network element, and the first network element receives the feedback information of the right policy rule sent by the second network element correspondingly.
In some embodiments, the equity policy rule feedback information is used to indicate at least one of adding equity policy rules, deleting equity policy rules, activating equity policy rules, deactivating equity policy rules, modifying equity policy rules.
In some embodiments, the equity policy rule feedback information is used to determine whether the second network element meets equity policy rule triggering conditions and requires a decision by the first network element to make equity policy rules.
S202, the first network element updates the rights policy rules based on feedback information of the rights policy rules.
In some embodiments, updating the equity policy rules includes at least one of adding equity policy rules, deleting equity policy rules, activating equity policy rules, deactivating equity policy rules, modifying equity policy rules.
For example, in the case that the first network element receives the benefit policy rule feedback information sent by the second network element and is used for indicating to increase the benefit policy rule, the first network element increases the benefit policy rule.
Wherein steps S201 and S202 may be performed after step S103, which is not limited by the present disclosure.
Based on the above, the second network element sends the feedback information of the right policy rule to the first network element, and the first network element can learn the execution condition of the existing right policy rule, so as to make adjustment according to the requirement. The dynamic updating rights policy rules ensure the high efficiency and adaptability of the rights policy rules, reduce potential problems and improve user satisfaction.
The embodiment of the disclosure provides a rights management method. As shown in fig. 4, the method is applied to a third network element, and comprises the following steps:
S301, the third network element sends indication information.
Wherein the indication information indicates acquisition of benefit information associated with the third network element.
S302, the third network element receives the rights and interests information.
In some embodiments, the third network element sending the indication information comprises at least one of:
sending first indication information to a first network element, wherein the first indication information is used for indicating the first network element to configure the rights and interests policy rules;
Sending second indication information to the second network element, wherein the second indication information is used for indicating the second network element to request the first network element to configure the right and benefit policy rule;
transmitting third indication information to the second network element, wherein the third indication information is used for indicating the second network element to activate the right policy rule;
and sending fourth indication information to the second network element, wherein the fourth indication information is used for indicating the second network element to perform rights control operation on the third network element.
The third network element benefit information includes at least one of:
the right information corresponding to the third network element;
The right information corresponding to other network elements interacted with the third network element;
and the third network element has the right information corresponding to other network elements of the transaction.
Based on the method, through the acquisition and control of the rights and interests information, the third network element can better manage the interaction and transaction with other network elements, and the safety and compliance of the communication process are ensured.
The network element comprises at least one of equipment, nodes, functions, entities, components and protocol layers.
In some embodiments, the first network element is one of a rights policy rule management network element, a centralized rights management network element, a PCF, a cloud service center, a network management center, a rights policy rule proxy, and a centralized unit.
In some embodiments, the second network element is one of a rights control management network element, a distributed rights management network element, an SMF, an AMF, a task management network element, a RAN, a centralized unit (centralized unit, CU), a rights control management agent, a Distributed Unit (DU).
In some embodiments, the third network element is one of AMF, UPF, RAN, a terminal, CU, DU, NEF, AF, and a benefit enforcement network element.
It is to be appreciated that the equity policy rule management network element can be a network element that analyzes, decides, generates, and or configures equity policy rules. The rights control management network element may be a network element that manages and controls the rights information and parameter interaction process. The rights execution network element may be a network element performing operations of rights generation, rights change, rights death, rights inquiry, rights recovery, and the like. The related rights operation performed by the rights execution network element may be an operation on the self-related rights or an operation on the related rights of other network elements. The equity execution network element may also be a network element providing resources and or services. The equity execution network element may also be a network element that uses resources and or services. The rights enforcement network element may also be a network element that needs to explicitly learn the rights of itself and/or other network elements. The equity execution network element may also be a network element that delivers/distributes data flows to which equity policy rules, equity parameters, or equity profiles are bound.
Illustratively, the first network element is a PCF, and the second network element is an SMF. The above transmission and reception processes are as follows, the PCF configures the entitlement policy rules and sends the entitlement policy rules to the SMF. And the SMF receives the rights policy rules from the PCF and performs rights control operation.
PCF configures the benefit policy rules example PCF may first analyze and make decisions on the benefit and then configure the benefit policy rules based on the decision results.
Alternatively, the operator or network manager may directly configure the PCF with one or more equity policy rules, such as by importing, downloading, etc.
Optionally, the PCF creates one or more benefit policy rules and sends the benefit policy rules to the SMF. The rights policy rules may be sent to the SMF either in PCC rules or as independent policy rules.
Optionally, the SMF first sends a benefit policy rule request to the PCF, which decides and configures the benefit policy rule based on the benefit policy request.
Optionally, the SMF sends feedback information of the benefit policy rule to the PCF, and the PCF receives the feedback information to update the benefit policy rule.
The SMF performs the entitlement control operation after receiving entitlement policy rules from the PCF, such as by the SMF binding one or more entitlement policy rules to a quality of service flow (quality of service flow).
Optionally, the SMF activates a set of rights control parameters according to the received rights policy rules.
Optionally, the SMF activates a rights policy rule based on the received rights policy rule.
Optionally, the SMF selects a UPF for data routing according to the received rights policy rule.
Optionally, the SMF selects a base station for data transmission according to the received rights policy rule.
Optionally, before the PCF sends the benefit policy rules, the SMF sends a request message to the PCF, the request message requesting one or more of the benefit policy rules.
Illustratively, as shown in FIG. 5, a benefit enforcement network element may be selected based on the benefit policy rules. Taking a first network element as a rights policy rule management network element and a second network element as a rights control management network element as an example, the method comprises the following steps:
S401, the equity policy rule management network element sends equity policy rules to the equity control management network element, and the equity control management network element receives equity policy rules sent by the equity policy rule management network element.
S402, the rights control management network element selects a rights execution network element based on the rights policy rules.
For example, the equity policy rule management network element is a PCF, the equity control management network element is an SMF, and the equity enforcement network element is a UPF. The SMF selects a UPF based on the benefit policy rules from the PCF.
For another example, the equity policy rule management network element is a PCF, the equity control management network element is an SMF, and the equity enforcement network element is a RAN. The SMF selects one RAN based on the benefit policy rules from the PCF.
For another example, the equity policy rule management network element is a PCF, the equity control management network element is an AMF, and the equity enforcement network element is a RAN. The AMF selects one RAN based on the benefit policy rules from the PCF.
For another example, the equity policy rule management network element is a PCF, the equity control management network element is an AMF, and the equity enforcement network element is a UE. The AMF selects one UE based on the equity policy rules from the PCF.
Illustratively, a 6G network will provide a variety of services of communication, awareness, computing, intelligence, security, trust, etc. Unlike 5G session management, tasks may occur in the future to manage such services as awareness tasks, communication tasks, artificial intelligence (ARTIFICIAL INTELLIGENCE, AI) tasks, computing tasks, and the like. The executive side of different tasks needs to be protected by interests while completing the tasks, and the network also needs to select the proper executive side of the tasks. Taking the first network element as a rights policy management network element and taking the second network element as a task management network element as an example, the rights policy management network element takes charge of generating and configuring one or more rights policy rules and sending the one or more rights policy rules to the task management network element. The task management network element generates a benefit control parameter that can be used to indicate the benefit owned by the task execution network element. The third network element is used as a task executive party and can also be responsible for executing rights and interests. For example, when the third network element performs the task, the task management network element can obtain which rights and interests the third network element should obtain. For example, the task management network element selects a task performer based on the equity policy rules.
In another exemplary embodiment, the first network element is a centralized rights management network element, and the second network element is a distributed rights management network element. The centralized rights management network element is responsible for the generation and configuration of one or more rights policy rules and sends the one or more rights policy rules to the distributed rights management network element. The distributed rights management network element generates rights control parameters that may be used to indicate rights owned by each network principal. Optionally, the first network element is a CU, the second network element is a DU, or the first network element is a core network, and the second network element is an access network.
Still further exemplary, in future networks, each network principal may provide various services such as communication services, awareness services, computing services, intelligent services, security trusted services, and the like. The sharing and trade of spectrum resources, data resources and computing power resources can be carried out, and storage resources and storage services can be provided. The providers, users, traders, witnessed persons of services and resources are very numerous and the rights involved are complex and variable. In addition to static equity policy rules, dynamic equity policy rules may also be required in the network. It may even be desirable for the network entity to actively make a equity request to trigger equity and activate equity policy rules. Taking the first network element as a right policy rule network element, the second network element as a right control management network element, and the third network element as a right execution network element as an example. The first network element makes decisions and configurations of the equity policy rules, and the triggering, activation of equity policy rules may come from the second network element or the third network element. For example, after the second network element performs rights monitoring on each main body in the network and discovers that the third network element equipment is updated, new service capability is added, and the first network element can be triggered to reform or modify the rights policy rules. For example, if the second network element monitors the interests of each entity in the network and finds that the user uses a device with a damage to the network security to access or performs a network attack, the second network element sends the user a reduced interest control parameter to limit the interests of the user. For example, the second network element performs rights and interests monitoring on each main body in the network, and discovers that the third party transaction platform can provide fair and safe transaction capability, and triggers the second network element to request the first network element to provide rights and interests policy rules in the aspect of data sharing opening for the transaction platform.
Still another example, in a target location scenario, the location-participating network element may have a core network, a base station, wireless fidelity (WIRELESS FIDELITY, wifi), a third party application. Positioning generally requires joint positioning of a plurality of base stations, and the joint positioning can be performed by combining wifi in the positioning process, and the positioning can also be performed by combining image or video analysis. The base station may belong to different operators, and wifi may belong to individuals, families and enterprises. The data of the image or video analysis may belong to an individual or business. The positioning data analysis may use AI models from AI company. Since multiple parties contribute to the location service, both parties to the location should gain rights. Through the rights management, settlement can be carried out among different operators, and a company providing wifi positioning auxiliary personnel or enterprises can obtain rewards and provide an AI algorithm model can be divided into. In a positioning scenario, a first network element (e.g., PCF) formulates a benefit policy rule. The second network element (such as SMF and AMF) is used as the benefit control management network element to select the third network element as the benefit main body for benefit control. The third network element may be a base station, wifi, third party application. And selecting a base station and free wifi joint location with an operator based on rights policy rules.
Still another exemplary, in a car networking scenario, there are a variety of network principals of vehicle manufacturers, telecom operators, software and platform providers, insurance companies, repair and service providers, data analysis companies, and the like. These subjects cooperate with each other in the internet of vehicles ecosystem to drive the development and application of internet of vehicles technologies together to improve traffic safety, efficiency and convenience. The rights and interests of all parties in the network can be defined through rights and interests policy rule configuration and rights and interests control, and the demands of all parties can be balanced and coordinated, so that the internet of vehicles multi-party co-treatment win-win is facilitated. In this scenario, the first network element is used as a benefit policy rule management network element to provide benefit policy rules for each party in the internet of vehicles. The second network element is used as a rights control management network element to control rights of the network main body. Optionally, the second network element associates the equity control parameters/equity policy rules with the respective internet of vehicles participants. The association mode can be sending the equity content to the participants with equity qualification of the internet of vehicles, sending equity control parameters to all the participants of the internet of vehicles, binding equity policy rules with data streams to control the transmission of the data streams, and the like. In the internet of vehicles scenario, the rights policy rule management network element may be a core network element (e.g. PCF), and the rights control management network element may be a core network element (e.g. SMF), a task management network element, or an access network element.
Still another example is that in a wireless communication network, there is a large network (abbreviated as a large network) built by an operator, and there is also a small network (abbreviated as a small network) such as an enterprise self-established network, a personal self-established network, a home network, and the like. There are some areas in the large network that are difficult to cover, and the small network can provide coverage supplements for the operator network. The small network may reduce construction costs by acquiring services and resources provided by the large network. For example, a large network provides a spectrum, powerful lease for a small network, while a small network also provides data sharing for a large network. Rights and interests can be traded between the large and small nets. Optionally, the first network element may be an authoritative rights policy management center or a large network policy management network element, and the second network element may be a rights control center, a rights transaction platform or a large network rights control network element. And carrying out rights and interests guarantee for the large network and the subnetwork through interaction of the first network element and the second network element.
Still another exemplary, in a satellite-ground fusion scenario, a satellite network provides large area coverage and access, and a terrestrial network may provide high-speed data transmission. The satellite operator and the terrestrial operator may provide a better user experience through mutual assistance. In this scenario, between satellite network operators and terrestrial operators, between different satellite network operators, explicit rights and interests are required between different terrestrial operators to achieve mutual assistance. Such as legal and legal based rights policy rules, may provide rights guarantees for different operators. Optionally, the first network element may be a rights management policy center with government endorsement or legal regulation support or approval by parties under contract agreement, and the second network element may be a rights control center or a rights transaction platform. And through interaction of the first network element and the second network element, rights and interests among operators are ensured.
The foregoing description of the embodiments of the present disclosure has been presented primarily in terms of methods. The following further illustrates a rights management device for performing the rights management method in any of the embodiments and possible implementations thereof, and a rights management device for performing the rights management method in any of the embodiments and possible implementations thereof.
It should be understood that, in order to implement the rights management method, the rights management device includes corresponding hardware structures and/or software modules for performing the functions, and those skilled in the art will readily appreciate that the algorithm steps of the examples described in connection with the embodiments of the disclosure may be implemented as hardware or a combination of hardware and computer software. Whether a function is implemented as hardware or computer software driven hardware depends upon the intended application and design constraints of the solution. The skilled artisan can use different methods for implementing the described functions for each preset application, but such implementation should not be considered beyond the scope of the present disclosure.
The embodiment of the disclosure may divide the function modules of the rights management device according to the embodiment of the method, for example, each function module may be divided corresponding to each function, or two or more functions may be integrated into one function module. The integrated modules described above may be implemented in hardware, or in the form of software. It should be noted that, in the embodiment of the present disclosure, the division of the modules is merely a logic function division, and other division manners may be implemented in actual practice. The following description will take an example of dividing each function module into corresponding functions.
Fig. 6 is a schematic structural diagram of a rights management device according to an embodiment of the present disclosure, which is applied to a first network element. The rights management device 600 includes a processing module 601 and a communication module 602.
A processing module 601, configured to configure rights policy rules;
The communication module 602 is configured to send a benefit policy rule to the second network element, where the benefit policy rule is used for the second network element to perform a benefit control operation in the network.
In some embodiments, the communication module 602 is configured to receive feedback information of the rights policy rule sent by the second network element;
the processing module 601 is configured to update the rights policy rule based on feedback information of the rights policy rule.
In some embodiments, the processing module 601 is further configured to make decisions of the equity policy rules.
In some embodiments, the decision to make the equity policy rule includes at least one of:
receiving a first request message sent by a second network element, wherein the first request message is used for requesting decision making of a rights policy rule;
receiving a second request message sent by a third network element, wherein the second request message is used for requesting decision making of the rights policy rule;
Inquiring the capability information of the third network element and making a decision of the rights policy rule;
making decisions of rights policy rules based on laws and regulations;
making decisions of rights policy rules based on contract subscription information;
and making a decision of the rights policy rule based on the local information of the first network element.
In some embodiments, the first network element is further configured to perform at least one of the following on the benefit policy rule:
downloading rights and interests policy rules;
Importing rights and interests policy rules;
generating rights policy rules;
Storing rights policy rules;
Adding rights and interests policy rules;
Deleting the rights and interests policy rules;
Activating rights policy rules;
deactivating the equity policy rules;
modifying rights policy rules;
the equity policy rules are updated.
In some embodiments, the communication module 602 is specifically configured to:
Transmitting a first rule to the second network element, wherein the first rule is a policy control and charging rule containing a rights policy rule, or
Transmitting a second rule to the second network element, the second rule being a special benefit policy rule, or
And sending a third rule to the second network element, wherein the third rule comprises a rights and interests policy rule information element.
In some embodiments, the equity policy rules include at least one of equity principal policy rules, equity partitioning policy rules, equity transaction policy rules.
In some embodiments, the equity principal policy rules are used to ensure the legitimacy of principal equity in the network, and the equity principal policy rules include at least one of principal qualification determination, principal legitimacy determination, legal regulations, contractual agreements, principal identity identification.
In some embodiments, the equity partitioning policy rules are used to partition equity of a network principal, the equity partitioning policy rules including at least one of a attribution right of a resource, a modification right of a resource, a use right of a resource, an attribution right of an asset, a modification right of an asset, a use right of an asset, an attribution right of a service, a modification right of a service, a use right of a service, a network awareness right, a network modification right, an incentive to be obtained, a score to be obtained.
In some embodiments, the equity transaction policy rules are used to specify rules to be followed by both parties to the transaction during the transaction, and include at least one of third party proof, transaction platform, transaction period, whether the transaction may be revoked, scoring policy, ledger selection, whether privacy protection is required, and the degree of privacy protection.
In some embodiments, the equity policy rules include at least one of equity policy rule identification, equity policy rule index, equity policy rule type, equity principal identification, equity principal's equity.
In some embodiments, the equity control operations include at least one of:
generating rights control parameters based on the rights policy rules;
Activating a rights control parameter based on a rights policy rule;
Binding the equity policy rules with a data stream based on equity policy rules;
Storing rights policy rules;
Activating a rights policy rule based on the rights policy rule;
deactivating a equity policy rule based on equity policy rules;
Updating the locally stored rights policy rules;
modifying locally stored equity policy rules;
Selecting a third network element based on the rights policy rules;
Sending rights control parameters to a third network element;
Generating a benefit configuration file based on the benefit policy rules, the benefit configuration file including the benefit control parameters;
activating a equity configuration file based on equity policy rules, the equity configuration file including equity control parameters;
And sending a benefit configuration file to the third network element, wherein the benefit configuration file comprises benefit control parameters.
In some embodiments, the equity control parameters include at least one of equity principal identification, equity content parameters owned by equity principal, equity audit parameters, equity usage parameters, equity pre-warning parameters, equity transaction parameters.
In some embodiments, the first network element is one of a equity policy rule management network element, a centralized equity management network element, a policy control function PCF, a cloud service center, a network management center, an equity policy rule proxy, a centralized unit.
In some embodiments the second network element is one of a rights control management network element, a distributed rights management network element, a session management function SMF, an access and mobility management function AMF, a task management network element, a radio access network RAN, a centralized unit CU, a rights control management agent, a distributed unit DU.
In some embodiments the third network element is one of an AMF, a user plane function UPF, a RAN, a terminal, a CU, a DU, a network opening function NEF, an application function AF, a benefit performing network element.
Fig. 7 is a schematic structural diagram of a rights management device according to an embodiment of the present disclosure, which is applied to a second network element. The rights management device 700 includes a communication module 701 and a processing module 702.
A communication module 701, configured to receive a benefit policy rule sent by a first network element;
a processing module 702, configured to perform a rights control operation in the network based on the rights policy rule.
In some embodiments, the communication module 701 is specifically configured to:
receiving a first rule sent by a first network element, wherein the first rule is a policy control and charging rule containing a benefit policy rule, or
Receiving a second rule sent by the first network element, wherein the second rule is a special rights policy rule, or
And receiving a third rule sent by the second network element, wherein the third rule comprises a rights policy rule information element.
In some embodiments, the communication module 701 is further configured to send a first request message to the first network element, where the first request message is used for requesting to make a decision of the benefit policy rule, or send the first request message to the first network element based on a preset condition, where the first request message is used for requesting to make a decision of the benefit policy rule.
In some embodiments, the preset conditions include at least one of:
Establishing a session;
establishing a terminal context;
Task establishment;
The method comprises the steps that a rights triggering condition is met, and the rights triggering condition is determined according to monitoring of rights conditions in a network;
And receiving indication information of the third network element, wherein the indication information is used for indicating to send a first request message to the first network element.
The details of the rights control operation, the rights policy rule, the first network element, the second network element, and the third network element related to the device on the present side may refer to the descriptions in the foregoing embodiments, and are not repeated herein.
Fig. 8 is a schematic structural diagram of a rights management device according to an embodiment of the present disclosure, which is applied to a third network element. The rights management device 800 includes a processing module 801 and a communication module 802.
A processing module 801, configured to determine indication information, where the indication information indicates that rights and interests information related to the third network element are acquired;
a communication module 802, configured to send indication information;
The communication module 802 is further configured to receive rights information.
In some embodiments, transmitting the indication information includes at least one of:
sending first indication information to a first network element, wherein the first indication information is used for indicating the first network element to configure the rights and interests policy rules;
Sending second indication information to the second network element, wherein the second indication information is used for indicating the second network element to request the first network element to configure the right and benefit policy rule;
transmitting third indication information to the second network element, wherein the third indication information is used for indicating the second network element to activate the right policy rule;
and sending fourth indication information to the second network element, wherein the fourth indication information is used for indicating the second network element to perform rights control operation on the third network element.
In some embodiments, the equity information includes at least one of:
the right information corresponding to the third network element;
The right information corresponding to other network elements interacted with the third network element;
and the third network element has the right information corresponding to other network elements of the transaction.
The specific relevant content of the first network element, the second network element, and the third network element related to the device on the present side may refer to the description in the foregoing embodiment, and will not be described herein again.
In the case of implementing the functions of the integrated modules in the form of hardware, the embodiments of the present disclosure also provide a possible structure of a communication device for executing the rights management method provided by the embodiments of the present disclosure. As shown in fig. 9, the communication device 900 includes a communication interface 903, a processor 902, and a bus 904. Optionally, the communication device may further comprise a memory 901.
The processor 902 may be any means for implementing or executing the various exemplary logic blocks, modules, and circuits described in connection with embodiments of the disclosure. The processor 902 may be a central processor, general purpose processor, digital signal processor, application specific integrated circuit, field programmable gate array or other programmable logic device, transistor logic device, hardware components, or any combination thereof. Which may implement or perform the various exemplary logic blocks, modules and circuits described in connection with embodiments of the disclosure. The processor 902 may also be a combination that performs computing functions, e.g., including one or more microprocessors, a combination of a DSP and a microprocessor, and the like.
A communication interface 903 for connecting to other devices via a communication network. The communication network may be an ethernet, a radio access network, a wireless local area network (wireless local area networks, WLAN), etc.
The memory 901 may be, but is not limited to, a read-only memory (ROM) or other type of static storage device that can store static information and instructions, a random access memory (random access memory, RAM) or other type of dynamic storage device that can store information and instructions, or an electrically erasable programmable read-only memory (ELECTRICALLY ERASABLE PROGRAMMABLE READ-only memory, EEPROM), a magnetic disk storage medium or other magnetic storage device, or any other medium that can be used to carry or store desired program code in the form of instructions or data structures and that can be accessed by a computer.
As a possible implementation, the memory 901 may exist separately from the processor 902, and the memory 901 may be connected to the processor 902 through the bus 904 for storing instructions or program code. The processor 902, when calling and executing instructions or program code stored in the memory 901, is capable of implementing the rights management methods provided by embodiments of the present disclosure.
In another possible implementation, the memory 901 may also be integrated with the processor 902.
Bus 904, which may be an extended industry standard architecture (extended industry standard architecture, EISA) bus, or the like. The bus 904 may be divided into an address bus, a data bus, a control bus, and the like. For ease of illustration, only one thick line is shown in fig. 9, but not only one bus or one type of bus.
Some embodiments of the present disclosure provide a computer readable storage medium (e.g., a non-transitory computer readable storage medium) having stored therein computer program instructions that, when run on a computer, cause the computer to perform the rights management method as described in any of the embodiments above.
In an exemplary embodiment, the computer may be the communication device described above, and the present disclosure is not limited to a specific form of the computer.
In some examples, the computer-readable storage medium described above may include, but is not limited to, magnetic storage devices (e.g., hard disk, floppy disk, magnetic strips, etc.), optical disks (e.g., compact Disk (CD), digital versatile disk (DIGITAL VERSATILEDISK, DVD), etc.), smart cards, and flash memory devices (e.g., erasable programmable read-only memory (EPROM), cards, sticks, key drives, etc. Various computer-readable storage media described in this disclosure may represent one or more devices and/or other machine-readable storage media for storing information. The term "machine-readable storage medium" can include, without being limited to, wireless channels and various other media capable of storing, containing, and/or carrying instruction(s) and/or data.
The disclosed embodiments provide a computer program product comprising instructions which, when run on a computer, cause the computer to perform the equity management method of any of the above embodiments.
The foregoing is merely a specific embodiment of the disclosure, but the protection scope of the disclosure is not limited thereto, and any changes or substitutions within the technical scope of the disclosure should be covered by the protection scope of the disclosure. Therefore, the protection scope of the present disclosure should be subject to the protection scope of the claims.