Movatterモバイル変換


[0]ホーム

URL:


CN120730257A - Equity management method, device and storage medium - Google Patents

Equity management method, device and storage medium

Info

Publication number
CN120730257A
CN120730257ACN202410385258.1ACN202410385258ACN120730257ACN 120730257 ACN120730257 ACN 120730257ACN 202410385258 ACN202410385258 ACN 202410385258ACN 120730257 ACN120730257 ACN 120730257A
Authority
CN
China
Prior art keywords
equity
rights
network element
policy
network
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202410385258.1A
Other languages
Chinese (zh)
Inventor
薛妍
谢峰
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
ZTE Corp
Original Assignee
ZTE Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by ZTE CorpfiledCriticalZTE Corp
Priority to CN202410385258.1ApriorityCriticalpatent/CN120730257A/en
Priority to PCT/CN2024/125567prioritypatent/WO2025200387A1/en
Publication of CN120730257ApublicationCriticalpatent/CN120730257A/en
Pendinglegal-statusCriticalCurrent

Links

Landscapes

Abstract

Translated fromChinese

本公开提供一种权益管理方法、装置及存储介质,涉及通信技术领域,用于保障网络主体的合法权益。该权益管理方法包括:第一网元配置权益策略规则;第一网元向第二网元发送权益策略规则,权益策略规则用于第二网元进行网络中的权益控制操作。

The present disclosure provides a rights management method, device, and storage medium, relating to the field of communications technology, for protecting the legitimate rights and interests of network entities. The rights management method includes: a first network element configuring rights policy rules; the first network element sending the rights policy rules to a second network element, where the rights policy rules are used by the second network element to perform rights control operations in the network.

Description

Rights management method, device and storage medium
Technical Field
The present disclosure relates to the field of communications technologies, and in particular, to a rights management method, apparatus, and storage medium.
Background
In conventional communication networks, network participants (i.e., network principals) are primarily wireless communication network operators, vendors, and users. The wireless communication carrier provides spectrum resources and communication connection services, the equipment carrier provides network equipment, and users pay to use the spectrum resources and the communication connection services. Traditional communication networks have no mechanism for rights management, and it is difficult to guarantee the rights of each body of the network. For example, when the network collects user measurement data, the user contributes to the network but is not rewarded accordingly. It is difficult to determine whether data generated by the equipment manufacturer in equipment development, network testing and optimization is attributed to the operator or to the equipment manufacturer. It can be seen that the rights and interests of the network body in the conventional communication network are inadequate.
The sixth generation mobile communication technology (6th generation wireless systems,6G) network in the future involves a great deal of network bodies, and the rights and interests will be more prominent. The 6G network body includes not only communication network operators, equipment vendors, personal consumer users, and industry users, but also satellite network operators, network virtual operators, third party application providers, self-built network providers, and the like. Network principals also have many roles in the network, such as providing services to the network, providing resources to the network, using network services, using network resources, guaranteeing resource transactions, and the like. It can be seen that network principals are increasing and the roles of network principals in the network are also becoming more complex, so that explicit rights management mechanisms need to be established to guarantee the legal rights of network participants.
Disclosure of Invention
The embodiment of the disclosure provides a rights management method, a device and a storage medium, which are used for guaranteeing legal rights of a network main body. The technical scheme provided by the embodiment of the disclosure is as follows:
In one aspect, a rights management method is provided, applied to a first network element, and the method includes:
Configuring rights and interests policy rules;
and sending the right policy rule to the second network element, wherein the right policy rule is used for the second network element to perform right control operation in the network.
In another aspect, a rights management method is provided, applied to a second network element, and the method includes:
receiving a rights policy rule sent by a first network element;
And performing rights control operations in the network based on the rights policy rules.
In yet another aspect, a rights management method is provided, applied to a third network element, and the method includes:
Sending indication information, wherein the indication information is used for indicating and acquiring rights and interests information related to a third network element;
rights information is received.
In yet another aspect, there is provided a rights management unit applied to a first network element, the unit including:
The processing module is used for configuring rights and interests policy rules;
And the communication module is used for sending the right policy rule to the second network element, wherein the right policy rule is used for the second network element to perform right control operation in the network.
In yet another aspect, a rights management device is provided and applied to a second network element, where the method includes:
The communication module is used for receiving the rights and interests policy rules sent by the first network element;
And the processing module is used for carrying out rights control operation in the network based on the rights policy rules.
In yet another aspect, a rights management device is provided and applied to a third network element, where the method includes:
the communication module is used for sending indication information, and the indication information is used for indicating and acquiring the rights and interests information related to the third network element;
And the communication module is also used for receiving the rights and interests information.
In yet another aspect, a communications apparatus is provided that includes a memory and a processor, the memory and the processor coupled, the memory configured to store computer program instructions executable by the processor, the processor when executing the computer program instructions implementing the rights management method of any of the embodiments described above.
In yet another aspect, a computer readable storage medium is provided, on which computer program instructions are stored, which when run on a computer (e.g. a rights management device or a signal transmission device) implement the rights management method of any of the embodiments described above.
In yet another aspect, a computer program product is provided, comprising computer program instructions that when executed implement the equity management method of any of the above embodiments.
The technical scheme provided by the embodiment of the disclosure is that the first network element is used for configuring the rights and interests policy rules, the first network element sends the rights and interests policy rules to the second network element, and the rights and interests policy rules are used for the second network element to perform rights and interests control operation in the network. The rights and interests are controlled through the transmission of the rights and interests policy rules, and the legal rights and interests of each network main body are defined. The rights control operation in the network is performed based on the rights policy rules, so that legal rights of all network main bodies are guaranteed, network fairness is maintained, initiative of network participants is further stimulated, and service experience and network value are improved.
Drawings
Fig. 1 is a schematic architecture diagram of a communication system according to an embodiment of the disclosure;
FIG. 2 is an interactive flow chart of a rights management method provided by an embodiment of the present disclosure;
FIG. 3 is an interactive flow chart of another rights management method provided by embodiments of the present disclosure;
FIG. 4 is a flowchart of a rights management method provided by an embodiment of the present disclosure;
FIG. 5 is an interactive flow chart of yet another method of rights management provided by embodiments of the present disclosure;
FIG. 6 is a schematic structural diagram of a rights management device according to an embodiment of the present disclosure;
FIG. 7 is a schematic diagram of another rights management device according to an embodiment of the present disclosure;
FIG. 8 is a schematic diagram of a rights management device according to another embodiment of the present disclosure;
fig. 9 is a schematic structural diagram of a communication device according to an embodiment of the disclosure.
Detailed Description
The following description of the technical solutions in the embodiments of the present disclosure will be made clearly and completely with reference to the accompanying drawings in the embodiments of the present disclosure, and it is apparent that the described embodiments are only some embodiments of the present disclosure, not all embodiments. Based on the embodiments in this disclosure, all other embodiments that a person of ordinary skill in the art would obtain without making any inventive effort are within the scope of protection of this disclosure.
In the description of the present disclosure, unless otherwise indicated, "/" means "or" and, for example, a/B may mean a or B. The term "and/or" herein is merely an association relation describing the association object, and means that three kinds of relations may exist, for example, a and/or B may mean that a exists alone, a and B exist together, and B exists alone. Furthermore, "at least one" means one or more, and "a plurality" means two or more. The terms "first," "second," and the like do not limit the number and order of execution, and the terms "first," "second," and the like do not necessarily differ.
It is noted that in this disclosure, words such as "exemplary" or "such as" are used to mean serving as examples, illustrations, or descriptions. Any embodiment or design described herein as "exemplary" or "e.g." should not be taken as preferred or advantageous over other embodiments or designs. Rather, the use of words such as "exemplary" or "such as" is intended to present related concepts in a concrete fashion.
Rights include both rights and interests, and generally refer to roles that a particular principal is assigned to possess, as well as to the corresponding rights and benefits, and the like. For example, rights-related roles are manager, provider, user, witness, transactor, platform provider, etc. Rights corresponding to rights include ownership right, attribution right, modification right, processing right, incentive right, witness right, transaction right, security privacy right, allocation right, knowledge right and the like. Benefits corresponding to rights are rewarded, incentives earned, rewarded, divided, etc.
The network body in the network has corresponding rights and interests for providing services, using services, providing resources, using resources and other network activities, and the network body should also have rights and interests for obtaining security guarantee. Rights management of network main bodies in the network not only can promote fair competition of the network main bodies and strengthen cooperative trust, but also is beneficial to network stability and sustainable development.
The fifth generation mobile communication technology (5th generation wireless systems,5G) network provides only communication connection services, and the resources with commercial value are spectrum resources. Policy control function (policy control function, PCF) is used to provide policy and charging rules for control plane functions in the 5G network, and service control is granted to session management function (session management function, SMF) by formulating policy control and charging rules (PCC rules) AND CHARGING and by authorizing service data flows (SERVICE DATA flows, SDFs) in units of SDFs. But the PCC rules are only used for user access restriction, service control for quality of service guarantee, traffic statistics and traffic billing according to subscription information. It can be seen that the 5G framework has no explicit equity management mechanism and lacks equity policy rule interaction, which makes the behavior of the network body in the network lack equity guarantee, and the contribution of the network body to the network is difficult to reasonably report.
The 6G network provides communication, perception, calculation, intelligence, security, credibility and other multi-capability comprehensive services. Resources of commercial value in 6G networks include data resources, computing resources, and storage resources in addition to spectrum resources. These services and resources can both transact and change as assets, which can relate to commercial value transactions, as well as to validation issues. It can be seen that the current communication network lacks a perfect rights management mechanism, so that legal rights of a network main body are difficult to be fairly guaranteed.
In view of this, the disclosure proposes a rights management method, which includes a first network element configuring rights policy rules, the first network element sending the rights policy rules to a second network element, the rights policy rules being used for a rights control operation in a network by the first network element. The rights and interests are controlled through the transmission of the rights and interests policy rules, and the legal rights and interests of each network main body are defined. The rights control operation in the network is performed based on the rights policy rules, so that legal rights of all network main bodies are guaranteed, network fairness is maintained, initiative of network participants is further stimulated, and service experience and network value are improved.
The technical solution provided in the embodiments of the present disclosure may be applied to various mobile communication networks, for example, a New Radio (NR) mobile communication network using 5G, a future mobile communication network, or a multiple communication technology convergence system, etc., which is not limited in the embodiments of the present disclosure.
By way of example, fig. 1 provides an architectural diagram of a communication system for the present disclosure, as shown in fig. 1, a 5G network may include a terminal device (UE), a radio access network (radio access network, RAN) device, a user plane function (user plane function, UPF), an access and mobility management function (ASSESS AND mobility management, AMF), an authentication server function (authentication server function, AUSF), a network slice selection function (network slice selection function, NSSF), a network opening function (network exposure function, NEF), a network function storage function (network exposure function Repository Function, NRF), a unified data management function (unified DATA MANAGEMENT, UDM), a data warehouse function (unified data repository, UDR), an application function (application function, AF), or a billing function (charging function, CHF), etc.
As shown in fig. 1, the terminal device accesses to the 5G network through the RAN device, the terminal device communicates with the AMF through an N1 interface (abbreviated as N1), the RAN device communicates with the AMF through an N2 interface (abbreviated as N2), the RAN device communicates with the UPF through an N3 interface (abbreviated as N3), the SMF communicates with the UPF through an N4 interface (abbreviated as N4), and the UPF accesses to the data network through an N6 interface (abbreviated as N6). In addition, AUSF, AMF, SMF, NSSF, NEF, NRF, PCF, UDM, UDR, CHF or AF control plane functions shown in fig. 1 interact with each other using a service interface. For example, nausf serves interfaces for external provision of AUSF, namf serves interfaces for external provision of AMF, nsmf serves interfaces for external provision of SMF, nnssf serves interfaces for external provision of NSSF, nnef serves interfaces for external provision of NEF, nnrf serves interfaces for external provision of NRF, npcf serves interfaces for external provision of PCF, nudm serves interfaces for external provision of UDM, nudr serves interfaces for external provision of UDR, nchf serves interfaces for external provision of CHF, and Naf serves interfaces for external provision of AF.
In some embodiments, the terminal device may be a device with a wireless transceiver function, which may be deployed on land, including indoor or outdoor, handheld, wearable or vehicle-mounted, may be deployed on water (such as a ship, etc.), and may be deployed in air (such as an airplane, a balloon, a satellite, etc.). The terminals may be mobile phones (mobile phones), tablet computers (Pad), computers with wireless transceiving functionality, virtual Reality (VR) terminals, augmented reality (augmented reality, AR) terminals, wireless terminals in industrial control (industrial control), wireless terminals in unmanned (SELF DRIVING), wireless terminals in telemedicine (remote media), wireless terminals in smart grid (SMART GRID), wireless terminals in transportation security (transportation safety), wireless terminals in smart city (SMART CITY), wireless terminals in smart home (smart home), etc. Embodiments of the present disclosure are not limited to application scenarios. A terminal may also be referred to as a user, user equipment, access terminal, UE unit, UE station, mobile station, remote terminal, mobile device, UE terminal, wireless communication device, UE agent, UE device, or the like, as embodiments of the present disclosure are not limited in this respect.
The application scenario of the embodiments of the present disclosure is not limited. The system architecture and the service scenario described in the embodiments of the present disclosure are for more clearly describing the technical solutions of the embodiments of the present disclosure, and do not constitute a limitation on the technical solutions provided by the embodiments of the present disclosure, and those skilled in the art can know that, with the evolution of the network architecture and the appearance of a new service scenario, the technical solutions provided by the embodiments of the present disclosure are applicable to similar technical problems.
The embodiment of the disclosure provides a rights management method. As shown in fig. 2, the method comprises the steps of:
S101, the first network element configures right policy rules.
The rights policy rules are the basis for rights determination, rights division and network value transaction of the network body. Through the rights policy rules, it can be determined whether the network body is legal, which rights the network body has, and how the network body performs transactions.
In some embodiments, the equity is an equity of a network principal. Wherein the network principal qualifies for interest, or the network principal may correspond to a business principal having business activity in the network.
The equity may be, for example, the equity of the first network element, the equity of the second network element, the equity of the third network element, or the equity of other network elements in the network, or the equity of business entities corresponding to the first network element, the second network element, the third network element, or other network elements in the network. Business entities corresponding to other network elements in the network include device manufacturers, service providers, content providers, and the like.
For example, the equity policy rules correspond to legal regulations to define network principal equity qualification.
Optionally, the equity policy rules specify equity components of the network principal in correspondence with contractual agreements. Or the equity policy rule is one to more sets of equity-related information that can provide equity control parameters or equity support parameters. Or the equity policy rule contains one to more rules. Each rights policy rule contains a plurality of rights related information elements, such as rights policy rule identification, network rights principal identification, rights content owned by the network rights principal, and the like.
In some embodiments, the equity policy rules include at least one of equity principal policy rules, equity partitioning policy rules, equity transaction policy rules.
In some embodiments, the equity subject policy rules are used to ensure the legitimacy of subject equity in the network and prevent illegal or non-compliant subjects from obtaining equity, and the equity subject policy rules include at least one of subject qualification determination, subject legitimacy determination, legal regulations, contractual agreements, and subject identity identification.
In some embodiments, the equity partitioning policy rules are used to partition equity of a network principal, the equity partitioning policy rules including at least one of a attribution right of a resource, a modification right of a resource, a use right of a resource, an attribution right of an asset, a modification right of an asset, a use right of an asset, an attribution right of a service, a modification right of a service, a use right of a service, a network awareness right, a network modification right, an incentive to be obtained, a score to be obtained.
In some embodiments, the equity transaction policy rules are used to specify rules to be followed by both parties to the transaction during the transaction, and include at least one of third party proof, transaction platform, transaction period, whether the transaction may be revoked, scoring policy, ledger selection, whether privacy protection is required, and the degree of privacy protection.
It will be appreciated that the rights body management policies, rights partitioning policy rules, and rights transaction policy rules are not limited to including only the foregoing, but may include other than the foregoing, as this disclosure is not limited thereto.
In some embodiments, the equity policy rules include one or more equity-related information elements. For example, the equity policy rules include at least one of equity policy rule identification, equity policy rule index, equity policy rule type, equity principal identification, equity principal's equity.
In some embodiments, the first network element further comprises prior to configuring the benefit policy rule, the first network element making a decision of the benefit policy rule.
In some embodiments, the first network element makes a decision of the equity policy rule, including at least one of:
the first network element receives a first request message sent by the second network element, wherein the first request message is used for requesting to make a decision of a rights policy rule;
the first network element receives a second request message sent by the third network element, wherein the second request message is used for requesting to make a decision of the rights policy rule;
The first network element inquires the capability information of the third network element and makes a decision of the rights policy rule;
the first network element makes decisions of rights policy rules based on laws and regulations;
the first network element makes a decision of a rights policy rule based on contract signing information;
The first network element makes a decision of the equity policy rule based on the local information of the first network element.
The decision of the rights policy rule comprises at least one of rights policy rule analysis, rights policy rule generation, rights policy rule formulation and rights policy rule modification.
In some embodiments, the first network element is further configured to perform at least one of the following on the benefit policy rule:
the first network element downloads the rights and interests policy rules;
the first network element imports the rights and interests policy rules;
generating a right strategy rule by the first network element;
the first network element stores rights policy rules;
the first network element adds a rights policy rule;
the first network element deletes the rights and interests policy rules;
the first network element activates the rights and interests policy rule;
the first network element deactivates the equity policy rule;
the first network element modifies the rights and interests policy rules;
the first network element updates the equity policy rules.
It will be appreciated that the first network element may first make a benefit policy rule decision and reconfigure the benefit policy rule. The first network element may also directly configure the benefit policy rules without making a benefit policy rule decision, e.g., an operator or manager directly imports the benefit policy rules to the first network element (e.g., the first network element is a PCF).
S102, the first network element sends the right policy rules to the second network element, and the second network element receives the right policy rules sent by the first network element correspondingly.
The right policy rule is used for the second network element to perform right control operation in the network.
In order to ensure fairness and authority, the rights control operations for each network principal need to be implemented based on rights policy rules. The rights control operation enables each network principal to know the rights of itself and other network principal, create a fair network environment, and encourage each network principal to actively participate in network contribution.
In some embodiments, the first network element sending the benefit policy rule to the second network element comprises at least one of sending a first rule to the second network element, the first rule comprising a policy control and charging rule (PCC rule) of the benefit policy rule, sending a second rule to the second network element, the second rule comprising a dedicated benefit policy rule, and sending a third rule to the second network element, the third rule comprising a benefit policy rule information element. The first rule and the third rule may be the same or different, and the second rule and the third rule may be the same or different.
It will be appreciated that in the case where the first network element sends PCC rules to the second network element and the PCC rules include benefit policy rules, the second network element obtains the benefit policy rules by receiving the PCC rules. The first network element may also send other rules including the benefit policy rules to the second network element so that the second network element obtains the benefit policy rules. The first network element may also send only the benefit policy rules to the second network element, which are not included in the other rules. The first network element may send the equity policy rules as information elements to the second network element in various rule transmissions.
In some embodiments, before the second network element receives the benefit policy rule sent by the first network element, the method further comprises the step that the second network element sends a first request message to the first network element, wherein the first request message is used for requesting to make a decision of the benefit policy rule, or the second network element sends the first request message to the first network element based on a preset condition, and the first request message is used for requesting to make a decision of the benefit policy rule.
The first request message may also be referred to by other names, such as a rights policy rule request, a rights request, etc., which the present disclosure does not limit.
For example, the second network element discovers that a new benefit policy rule needs to be added, and the second network element sends a first request message to the first network element, where the first request message is used to request the first network element to add a benefit policy rule.
For another example, the second network element finds that the original rights policy rule is invalid, and the second network element sends a first request message, where the first request message is used to request the first network element to delete the original rights policy rule.
In some embodiments, the preset condition at least comprises at least one of session establishment, terminal context establishment, task establishment, satisfaction of a benefit trigger condition, determination of the benefit trigger condition according to monitoring of a benefit condition in the network, and reception of indication information of a third network element, wherein the indication information is used for indicating transmission of a first request message to the first network element. The indication information of the third network element comprises capability information of the third network element and/or resource request information of the third network element.
S103, the second network element performs rights control operation in the network based on the rights policy rules.
In some embodiments, the equity control operations include at least one of:
The second network element generates rights control parameters based on the rights policy rules;
the second network element activates the rights control parameters based on the rights policy rules;
the second network element binds the equity policy rule with a data stream based on the equity policy rule;
the second network element stores rights policy rules;
the second network element activates a rights policy rule based on the rights policy rule;
the second network element deactivates one of the equity policy rules based on the equity policy rule;
the second network element updates the locally stored rights policy rules;
the second network element modifies the locally stored equity policy rules;
the second network element selects a third network element based on the rights policy rules;
The second network element sends the right control parameter to the third network element;
The second network element generates a benefit configuration file based on the benefit policy rule, wherein the benefit configuration file comprises a benefit control parameter;
the second network element activates a benefit configuration file based on a benefit policy rule, the benefit configuration file including a benefit control parameter;
the second network element sends a benefit profile to the third network element, the benefit profile including benefit control parameters.
In some embodiments, the equity control parameters include at least one of equity principal identification, equity content parameters owned by equity principal, equity audit parameters, equity usage parameters, equity pre-warning parameters, equity transaction parameters.
Based on the control, the control of the rights and interests is carried out through the transmission of the rights and interests policy rules, and the legal rights and interests of each network main body are defined. The rights control operation in the network is performed based on the rights policy rules, so that legal rights of all network main bodies are guaranteed, network fairness is maintained, initiative of network participants is further stimulated, and service experience and network value are improved.
In some embodiments, the first network element receives feedback information of the equity policy rules sent by the second network element, and the first network element updates the equity policy rules based on the feedback information of the equity policy rules.
Exemplary, as shown in fig. 3, the embodiment of the present disclosure further provides a rights management method, including the following steps S201 and S202.
S201, the second network element sends the feedback information of the right policy rule to the first network element, and the first network element receives the feedback information of the right policy rule sent by the second network element correspondingly.
In some embodiments, the equity policy rule feedback information is used to indicate at least one of adding equity policy rules, deleting equity policy rules, activating equity policy rules, deactivating equity policy rules, modifying equity policy rules.
In some embodiments, the equity policy rule feedback information is used to determine whether the second network element meets equity policy rule triggering conditions and requires a decision by the first network element to make equity policy rules.
S202, the first network element updates the rights policy rules based on feedback information of the rights policy rules.
In some embodiments, updating the equity policy rules includes at least one of adding equity policy rules, deleting equity policy rules, activating equity policy rules, deactivating equity policy rules, modifying equity policy rules.
For example, in the case that the first network element receives the benefit policy rule feedback information sent by the second network element and is used for indicating to increase the benefit policy rule, the first network element increases the benefit policy rule.
Wherein steps S201 and S202 may be performed after step S103, which is not limited by the present disclosure.
Based on the above, the second network element sends the feedback information of the right policy rule to the first network element, and the first network element can learn the execution condition of the existing right policy rule, so as to make adjustment according to the requirement. The dynamic updating rights policy rules ensure the high efficiency and adaptability of the rights policy rules, reduce potential problems and improve user satisfaction.
The embodiment of the disclosure provides a rights management method. As shown in fig. 4, the method is applied to a third network element, and comprises the following steps:
S301, the third network element sends indication information.
Wherein the indication information indicates acquisition of benefit information associated with the third network element.
S302, the third network element receives the rights and interests information.
In some embodiments, the third network element sending the indication information comprises at least one of:
sending first indication information to a first network element, wherein the first indication information is used for indicating the first network element to configure the rights and interests policy rules;
Sending second indication information to the second network element, wherein the second indication information is used for indicating the second network element to request the first network element to configure the right and benefit policy rule;
transmitting third indication information to the second network element, wherein the third indication information is used for indicating the second network element to activate the right policy rule;
and sending fourth indication information to the second network element, wherein the fourth indication information is used for indicating the second network element to perform rights control operation on the third network element.
The third network element benefit information includes at least one of:
the right information corresponding to the third network element;
The right information corresponding to other network elements interacted with the third network element;
and the third network element has the right information corresponding to other network elements of the transaction.
Based on the method, through the acquisition and control of the rights and interests information, the third network element can better manage the interaction and transaction with other network elements, and the safety and compliance of the communication process are ensured.
The network element comprises at least one of equipment, nodes, functions, entities, components and protocol layers.
In some embodiments, the first network element is one of a rights policy rule management network element, a centralized rights management network element, a PCF, a cloud service center, a network management center, a rights policy rule proxy, and a centralized unit.
In some embodiments, the second network element is one of a rights control management network element, a distributed rights management network element, an SMF, an AMF, a task management network element, a RAN, a centralized unit (centralized unit, CU), a rights control management agent, a Distributed Unit (DU).
In some embodiments, the third network element is one of AMF, UPF, RAN, a terminal, CU, DU, NEF, AF, and a benefit enforcement network element.
It is to be appreciated that the equity policy rule management network element can be a network element that analyzes, decides, generates, and or configures equity policy rules. The rights control management network element may be a network element that manages and controls the rights information and parameter interaction process. The rights execution network element may be a network element performing operations of rights generation, rights change, rights death, rights inquiry, rights recovery, and the like. The related rights operation performed by the rights execution network element may be an operation on the self-related rights or an operation on the related rights of other network elements. The equity execution network element may also be a network element providing resources and or services. The equity execution network element may also be a network element that uses resources and or services. The rights enforcement network element may also be a network element that needs to explicitly learn the rights of itself and/or other network elements. The equity execution network element may also be a network element that delivers/distributes data flows to which equity policy rules, equity parameters, or equity profiles are bound.
Illustratively, the first network element is a PCF, and the second network element is an SMF. The above transmission and reception processes are as follows, the PCF configures the entitlement policy rules and sends the entitlement policy rules to the SMF. And the SMF receives the rights policy rules from the PCF and performs rights control operation.
PCF configures the benefit policy rules example PCF may first analyze and make decisions on the benefit and then configure the benefit policy rules based on the decision results.
Alternatively, the operator or network manager may directly configure the PCF with one or more equity policy rules, such as by importing, downloading, etc.
Optionally, the PCF creates one or more benefit policy rules and sends the benefit policy rules to the SMF. The rights policy rules may be sent to the SMF either in PCC rules or as independent policy rules.
Optionally, the SMF first sends a benefit policy rule request to the PCF, which decides and configures the benefit policy rule based on the benefit policy request.
Optionally, the SMF sends feedback information of the benefit policy rule to the PCF, and the PCF receives the feedback information to update the benefit policy rule.
The SMF performs the entitlement control operation after receiving entitlement policy rules from the PCF, such as by the SMF binding one or more entitlement policy rules to a quality of service flow (quality of service flow).
Optionally, the SMF activates a set of rights control parameters according to the received rights policy rules.
Optionally, the SMF activates a rights policy rule based on the received rights policy rule.
Optionally, the SMF selects a UPF for data routing according to the received rights policy rule.
Optionally, the SMF selects a base station for data transmission according to the received rights policy rule.
Optionally, before the PCF sends the benefit policy rules, the SMF sends a request message to the PCF, the request message requesting one or more of the benefit policy rules.
Illustratively, as shown in FIG. 5, a benefit enforcement network element may be selected based on the benefit policy rules. Taking a first network element as a rights policy rule management network element and a second network element as a rights control management network element as an example, the method comprises the following steps:
S401, the equity policy rule management network element sends equity policy rules to the equity control management network element, and the equity control management network element receives equity policy rules sent by the equity policy rule management network element.
S402, the rights control management network element selects a rights execution network element based on the rights policy rules.
For example, the equity policy rule management network element is a PCF, the equity control management network element is an SMF, and the equity enforcement network element is a UPF. The SMF selects a UPF based on the benefit policy rules from the PCF.
For another example, the equity policy rule management network element is a PCF, the equity control management network element is an SMF, and the equity enforcement network element is a RAN. The SMF selects one RAN based on the benefit policy rules from the PCF.
For another example, the equity policy rule management network element is a PCF, the equity control management network element is an AMF, and the equity enforcement network element is a RAN. The AMF selects one RAN based on the benefit policy rules from the PCF.
For another example, the equity policy rule management network element is a PCF, the equity control management network element is an AMF, and the equity enforcement network element is a UE. The AMF selects one UE based on the equity policy rules from the PCF.
Illustratively, a 6G network will provide a variety of services of communication, awareness, computing, intelligence, security, trust, etc. Unlike 5G session management, tasks may occur in the future to manage such services as awareness tasks, communication tasks, artificial intelligence (ARTIFICIAL INTELLIGENCE, AI) tasks, computing tasks, and the like. The executive side of different tasks needs to be protected by interests while completing the tasks, and the network also needs to select the proper executive side of the tasks. Taking the first network element as a rights policy management network element and taking the second network element as a task management network element as an example, the rights policy management network element takes charge of generating and configuring one or more rights policy rules and sending the one or more rights policy rules to the task management network element. The task management network element generates a benefit control parameter that can be used to indicate the benefit owned by the task execution network element. The third network element is used as a task executive party and can also be responsible for executing rights and interests. For example, when the third network element performs the task, the task management network element can obtain which rights and interests the third network element should obtain. For example, the task management network element selects a task performer based on the equity policy rules.
In another exemplary embodiment, the first network element is a centralized rights management network element, and the second network element is a distributed rights management network element. The centralized rights management network element is responsible for the generation and configuration of one or more rights policy rules and sends the one or more rights policy rules to the distributed rights management network element. The distributed rights management network element generates rights control parameters that may be used to indicate rights owned by each network principal. Optionally, the first network element is a CU, the second network element is a DU, or the first network element is a core network, and the second network element is an access network.
Still further exemplary, in future networks, each network principal may provide various services such as communication services, awareness services, computing services, intelligent services, security trusted services, and the like. The sharing and trade of spectrum resources, data resources and computing power resources can be carried out, and storage resources and storage services can be provided. The providers, users, traders, witnessed persons of services and resources are very numerous and the rights involved are complex and variable. In addition to static equity policy rules, dynamic equity policy rules may also be required in the network. It may even be desirable for the network entity to actively make a equity request to trigger equity and activate equity policy rules. Taking the first network element as a right policy rule network element, the second network element as a right control management network element, and the third network element as a right execution network element as an example. The first network element makes decisions and configurations of the equity policy rules, and the triggering, activation of equity policy rules may come from the second network element or the third network element. For example, after the second network element performs rights monitoring on each main body in the network and discovers that the third network element equipment is updated, new service capability is added, and the first network element can be triggered to reform or modify the rights policy rules. For example, if the second network element monitors the interests of each entity in the network and finds that the user uses a device with a damage to the network security to access or performs a network attack, the second network element sends the user a reduced interest control parameter to limit the interests of the user. For example, the second network element performs rights and interests monitoring on each main body in the network, and discovers that the third party transaction platform can provide fair and safe transaction capability, and triggers the second network element to request the first network element to provide rights and interests policy rules in the aspect of data sharing opening for the transaction platform.
Still another example, in a target location scenario, the location-participating network element may have a core network, a base station, wireless fidelity (WIRELESS FIDELITY, wifi), a third party application. Positioning generally requires joint positioning of a plurality of base stations, and the joint positioning can be performed by combining wifi in the positioning process, and the positioning can also be performed by combining image or video analysis. The base station may belong to different operators, and wifi may belong to individuals, families and enterprises. The data of the image or video analysis may belong to an individual or business. The positioning data analysis may use AI models from AI company. Since multiple parties contribute to the location service, both parties to the location should gain rights. Through the rights management, settlement can be carried out among different operators, and a company providing wifi positioning auxiliary personnel or enterprises can obtain rewards and provide an AI algorithm model can be divided into. In a positioning scenario, a first network element (e.g., PCF) formulates a benefit policy rule. The second network element (such as SMF and AMF) is used as the benefit control management network element to select the third network element as the benefit main body for benefit control. The third network element may be a base station, wifi, third party application. And selecting a base station and free wifi joint location with an operator based on rights policy rules.
Still another exemplary, in a car networking scenario, there are a variety of network principals of vehicle manufacturers, telecom operators, software and platform providers, insurance companies, repair and service providers, data analysis companies, and the like. These subjects cooperate with each other in the internet of vehicles ecosystem to drive the development and application of internet of vehicles technologies together to improve traffic safety, efficiency and convenience. The rights and interests of all parties in the network can be defined through rights and interests policy rule configuration and rights and interests control, and the demands of all parties can be balanced and coordinated, so that the internet of vehicles multi-party co-treatment win-win is facilitated. In this scenario, the first network element is used as a benefit policy rule management network element to provide benefit policy rules for each party in the internet of vehicles. The second network element is used as a rights control management network element to control rights of the network main body. Optionally, the second network element associates the equity control parameters/equity policy rules with the respective internet of vehicles participants. The association mode can be sending the equity content to the participants with equity qualification of the internet of vehicles, sending equity control parameters to all the participants of the internet of vehicles, binding equity policy rules with data streams to control the transmission of the data streams, and the like. In the internet of vehicles scenario, the rights policy rule management network element may be a core network element (e.g. PCF), and the rights control management network element may be a core network element (e.g. SMF), a task management network element, or an access network element.
Still another example is that in a wireless communication network, there is a large network (abbreviated as a large network) built by an operator, and there is also a small network (abbreviated as a small network) such as an enterprise self-established network, a personal self-established network, a home network, and the like. There are some areas in the large network that are difficult to cover, and the small network can provide coverage supplements for the operator network. The small network may reduce construction costs by acquiring services and resources provided by the large network. For example, a large network provides a spectrum, powerful lease for a small network, while a small network also provides data sharing for a large network. Rights and interests can be traded between the large and small nets. Optionally, the first network element may be an authoritative rights policy management center or a large network policy management network element, and the second network element may be a rights control center, a rights transaction platform or a large network rights control network element. And carrying out rights and interests guarantee for the large network and the subnetwork through interaction of the first network element and the second network element.
Still another exemplary, in a satellite-ground fusion scenario, a satellite network provides large area coverage and access, and a terrestrial network may provide high-speed data transmission. The satellite operator and the terrestrial operator may provide a better user experience through mutual assistance. In this scenario, between satellite network operators and terrestrial operators, between different satellite network operators, explicit rights and interests are required between different terrestrial operators to achieve mutual assistance. Such as legal and legal based rights policy rules, may provide rights guarantees for different operators. Optionally, the first network element may be a rights management policy center with government endorsement or legal regulation support or approval by parties under contract agreement, and the second network element may be a rights control center or a rights transaction platform. And through interaction of the first network element and the second network element, rights and interests among operators are ensured.
The foregoing description of the embodiments of the present disclosure has been presented primarily in terms of methods. The following further illustrates a rights management device for performing the rights management method in any of the embodiments and possible implementations thereof, and a rights management device for performing the rights management method in any of the embodiments and possible implementations thereof.
It should be understood that, in order to implement the rights management method, the rights management device includes corresponding hardware structures and/or software modules for performing the functions, and those skilled in the art will readily appreciate that the algorithm steps of the examples described in connection with the embodiments of the disclosure may be implemented as hardware or a combination of hardware and computer software. Whether a function is implemented as hardware or computer software driven hardware depends upon the intended application and design constraints of the solution. The skilled artisan can use different methods for implementing the described functions for each preset application, but such implementation should not be considered beyond the scope of the present disclosure.
The embodiment of the disclosure may divide the function modules of the rights management device according to the embodiment of the method, for example, each function module may be divided corresponding to each function, or two or more functions may be integrated into one function module. The integrated modules described above may be implemented in hardware, or in the form of software. It should be noted that, in the embodiment of the present disclosure, the division of the modules is merely a logic function division, and other division manners may be implemented in actual practice. The following description will take an example of dividing each function module into corresponding functions.
Fig. 6 is a schematic structural diagram of a rights management device according to an embodiment of the present disclosure, which is applied to a first network element. The rights management device 600 includes a processing module 601 and a communication module 602.
A processing module 601, configured to configure rights policy rules;
The communication module 602 is configured to send a benefit policy rule to the second network element, where the benefit policy rule is used for the second network element to perform a benefit control operation in the network.
In some embodiments, the communication module 602 is configured to receive feedback information of the rights policy rule sent by the second network element;
the processing module 601 is configured to update the rights policy rule based on feedback information of the rights policy rule.
In some embodiments, the processing module 601 is further configured to make decisions of the equity policy rules.
In some embodiments, the decision to make the equity policy rule includes at least one of:
receiving a first request message sent by a second network element, wherein the first request message is used for requesting decision making of a rights policy rule;
receiving a second request message sent by a third network element, wherein the second request message is used for requesting decision making of the rights policy rule;
Inquiring the capability information of the third network element and making a decision of the rights policy rule;
making decisions of rights policy rules based on laws and regulations;
making decisions of rights policy rules based on contract subscription information;
and making a decision of the rights policy rule based on the local information of the first network element.
In some embodiments, the first network element is further configured to perform at least one of the following on the benefit policy rule:
downloading rights and interests policy rules;
Importing rights and interests policy rules;
generating rights policy rules;
Storing rights policy rules;
Adding rights and interests policy rules;
Deleting the rights and interests policy rules;
Activating rights policy rules;
deactivating the equity policy rules;
modifying rights policy rules;
the equity policy rules are updated.
In some embodiments, the communication module 602 is specifically configured to:
Transmitting a first rule to the second network element, wherein the first rule is a policy control and charging rule containing a rights policy rule, or
Transmitting a second rule to the second network element, the second rule being a special benefit policy rule, or
And sending a third rule to the second network element, wherein the third rule comprises a rights and interests policy rule information element.
In some embodiments, the equity policy rules include at least one of equity principal policy rules, equity partitioning policy rules, equity transaction policy rules.
In some embodiments, the equity principal policy rules are used to ensure the legitimacy of principal equity in the network, and the equity principal policy rules include at least one of principal qualification determination, principal legitimacy determination, legal regulations, contractual agreements, principal identity identification.
In some embodiments, the equity partitioning policy rules are used to partition equity of a network principal, the equity partitioning policy rules including at least one of a attribution right of a resource, a modification right of a resource, a use right of a resource, an attribution right of an asset, a modification right of an asset, a use right of an asset, an attribution right of a service, a modification right of a service, a use right of a service, a network awareness right, a network modification right, an incentive to be obtained, a score to be obtained.
In some embodiments, the equity transaction policy rules are used to specify rules to be followed by both parties to the transaction during the transaction, and include at least one of third party proof, transaction platform, transaction period, whether the transaction may be revoked, scoring policy, ledger selection, whether privacy protection is required, and the degree of privacy protection.
In some embodiments, the equity policy rules include at least one of equity policy rule identification, equity policy rule index, equity policy rule type, equity principal identification, equity principal's equity.
In some embodiments, the equity control operations include at least one of:
generating rights control parameters based on the rights policy rules;
Activating a rights control parameter based on a rights policy rule;
Binding the equity policy rules with a data stream based on equity policy rules;
Storing rights policy rules;
Activating a rights policy rule based on the rights policy rule;
deactivating a equity policy rule based on equity policy rules;
Updating the locally stored rights policy rules;
modifying locally stored equity policy rules;
Selecting a third network element based on the rights policy rules;
Sending rights control parameters to a third network element;
Generating a benefit configuration file based on the benefit policy rules, the benefit configuration file including the benefit control parameters;
activating a equity configuration file based on equity policy rules, the equity configuration file including equity control parameters;
And sending a benefit configuration file to the third network element, wherein the benefit configuration file comprises benefit control parameters.
In some embodiments, the equity control parameters include at least one of equity principal identification, equity content parameters owned by equity principal, equity audit parameters, equity usage parameters, equity pre-warning parameters, equity transaction parameters.
In some embodiments, the first network element is one of a equity policy rule management network element, a centralized equity management network element, a policy control function PCF, a cloud service center, a network management center, an equity policy rule proxy, a centralized unit.
In some embodiments the second network element is one of a rights control management network element, a distributed rights management network element, a session management function SMF, an access and mobility management function AMF, a task management network element, a radio access network RAN, a centralized unit CU, a rights control management agent, a distributed unit DU.
In some embodiments the third network element is one of an AMF, a user plane function UPF, a RAN, a terminal, a CU, a DU, a network opening function NEF, an application function AF, a benefit performing network element.
Fig. 7 is a schematic structural diagram of a rights management device according to an embodiment of the present disclosure, which is applied to a second network element. The rights management device 700 includes a communication module 701 and a processing module 702.
A communication module 701, configured to receive a benefit policy rule sent by a first network element;
a processing module 702, configured to perform a rights control operation in the network based on the rights policy rule.
In some embodiments, the communication module 701 is specifically configured to:
receiving a first rule sent by a first network element, wherein the first rule is a policy control and charging rule containing a benefit policy rule, or
Receiving a second rule sent by the first network element, wherein the second rule is a special rights policy rule, or
And receiving a third rule sent by the second network element, wherein the third rule comprises a rights policy rule information element.
In some embodiments, the communication module 701 is further configured to send a first request message to the first network element, where the first request message is used for requesting to make a decision of the benefit policy rule, or send the first request message to the first network element based on a preset condition, where the first request message is used for requesting to make a decision of the benefit policy rule.
In some embodiments, the preset conditions include at least one of:
Establishing a session;
establishing a terminal context;
Task establishment;
The method comprises the steps that a rights triggering condition is met, and the rights triggering condition is determined according to monitoring of rights conditions in a network;
And receiving indication information of the third network element, wherein the indication information is used for indicating to send a first request message to the first network element.
The details of the rights control operation, the rights policy rule, the first network element, the second network element, and the third network element related to the device on the present side may refer to the descriptions in the foregoing embodiments, and are not repeated herein.
Fig. 8 is a schematic structural diagram of a rights management device according to an embodiment of the present disclosure, which is applied to a third network element. The rights management device 800 includes a processing module 801 and a communication module 802.
A processing module 801, configured to determine indication information, where the indication information indicates that rights and interests information related to the third network element are acquired;
a communication module 802, configured to send indication information;
The communication module 802 is further configured to receive rights information.
In some embodiments, transmitting the indication information includes at least one of:
sending first indication information to a first network element, wherein the first indication information is used for indicating the first network element to configure the rights and interests policy rules;
Sending second indication information to the second network element, wherein the second indication information is used for indicating the second network element to request the first network element to configure the right and benefit policy rule;
transmitting third indication information to the second network element, wherein the third indication information is used for indicating the second network element to activate the right policy rule;
and sending fourth indication information to the second network element, wherein the fourth indication information is used for indicating the second network element to perform rights control operation on the third network element.
In some embodiments, the equity information includes at least one of:
the right information corresponding to the third network element;
The right information corresponding to other network elements interacted with the third network element;
and the third network element has the right information corresponding to other network elements of the transaction.
The specific relevant content of the first network element, the second network element, and the third network element related to the device on the present side may refer to the description in the foregoing embodiment, and will not be described herein again.
In the case of implementing the functions of the integrated modules in the form of hardware, the embodiments of the present disclosure also provide a possible structure of a communication device for executing the rights management method provided by the embodiments of the present disclosure. As shown in fig. 9, the communication device 900 includes a communication interface 903, a processor 902, and a bus 904. Optionally, the communication device may further comprise a memory 901.
The processor 902 may be any means for implementing or executing the various exemplary logic blocks, modules, and circuits described in connection with embodiments of the disclosure. The processor 902 may be a central processor, general purpose processor, digital signal processor, application specific integrated circuit, field programmable gate array or other programmable logic device, transistor logic device, hardware components, or any combination thereof. Which may implement or perform the various exemplary logic blocks, modules and circuits described in connection with embodiments of the disclosure. The processor 902 may also be a combination that performs computing functions, e.g., including one or more microprocessors, a combination of a DSP and a microprocessor, and the like.
A communication interface 903 for connecting to other devices via a communication network. The communication network may be an ethernet, a radio access network, a wireless local area network (wireless local area networks, WLAN), etc.
The memory 901 may be, but is not limited to, a read-only memory (ROM) or other type of static storage device that can store static information and instructions, a random access memory (random access memory, RAM) or other type of dynamic storage device that can store information and instructions, or an electrically erasable programmable read-only memory (ELECTRICALLY ERASABLE PROGRAMMABLE READ-only memory, EEPROM), a magnetic disk storage medium or other magnetic storage device, or any other medium that can be used to carry or store desired program code in the form of instructions or data structures and that can be accessed by a computer.
As a possible implementation, the memory 901 may exist separately from the processor 902, and the memory 901 may be connected to the processor 902 through the bus 904 for storing instructions or program code. The processor 902, when calling and executing instructions or program code stored in the memory 901, is capable of implementing the rights management methods provided by embodiments of the present disclosure.
In another possible implementation, the memory 901 may also be integrated with the processor 902.
Bus 904, which may be an extended industry standard architecture (extended industry standard architecture, EISA) bus, or the like. The bus 904 may be divided into an address bus, a data bus, a control bus, and the like. For ease of illustration, only one thick line is shown in fig. 9, but not only one bus or one type of bus.
Some embodiments of the present disclosure provide a computer readable storage medium (e.g., a non-transitory computer readable storage medium) having stored therein computer program instructions that, when run on a computer, cause the computer to perform the rights management method as described in any of the embodiments above.
In an exemplary embodiment, the computer may be the communication device described above, and the present disclosure is not limited to a specific form of the computer.
In some examples, the computer-readable storage medium described above may include, but is not limited to, magnetic storage devices (e.g., hard disk, floppy disk, magnetic strips, etc.), optical disks (e.g., compact Disk (CD), digital versatile disk (DIGITAL VERSATILEDISK, DVD), etc.), smart cards, and flash memory devices (e.g., erasable programmable read-only memory (EPROM), cards, sticks, key drives, etc. Various computer-readable storage media described in this disclosure may represent one or more devices and/or other machine-readable storage media for storing information. The term "machine-readable storage medium" can include, without being limited to, wireless channels and various other media capable of storing, containing, and/or carrying instruction(s) and/or data.
The disclosed embodiments provide a computer program product comprising instructions which, when run on a computer, cause the computer to perform the equity management method of any of the above embodiments.
The foregoing is merely a specific embodiment of the disclosure, but the protection scope of the disclosure is not limited thereto, and any changes or substitutions within the technical scope of the disclosure should be covered by the protection scope of the disclosure. Therefore, the protection scope of the present disclosure should be subject to the protection scope of the claims.

Claims (38)

Translated fromChinese
1.一种权益管理方法,其特征在于,应用于第一网元,所述方法包括:1. A rights management method, characterized in that it is applied to a first network element, the method comprising:配置权益策略规则;Configure equity policy rules;向第二网元发送所述权益策略规则,所述权益策略规则用于所述第二网元进行网络中的权益控制操作。The equity policy rule is sent to the second network element, where the equity policy rule is used by the second network element to perform equity control operations in the network.2.根据权利要求1所述的方法,其特征在于,所述方法还包括:2. The method according to claim 1, further comprising:接收所述第二网元发送的所述权益策略规则的反馈信息;receiving feedback information of the equity policy rule sent by the second network element;基于所述权益策略规则的反馈信息,更新所述权益策略规则。Based on the feedback information of the equity policy rule, the equity policy rule is updated.3.根据权利要求1所述的方法,其特征在于,所述配置权益策略规则之前还包括:进行所述权益策略规则的决策。3. The method according to claim 1 is characterized in that before configuring the equity policy rules, it also includes: making a decision on the equity policy rules.4.根据权利要求3所述的方法,其特征在于,所述进行所述权益策略规则的决策,包括以下至少一项:4. The method according to claim 3, wherein the decision-making of the equity policy rule comprises at least one of the following:接收所述第二网元发送的第一请求消息,所述第一请求消息用于请求进行所述权益策略规则的决策;receiving a first request message sent by the second network element, where the first request message is used to request a decision on the equity policy rule;接收第三网元发送的第二请求消息,所述第二请求消息用于请求进行所述权益策略规则的决策;receiving a second request message sent by a third network element, where the second request message is used to request a decision on the equity policy rule;查询第三网元能力信息并进行所述权益策略规则的决策;Querying third network element capability information and making decisions based on the equity policy rules;基于法律法规进行所述权益策略规则的决策;Make decisions on equity strategy rules based on laws and regulations;基于合同签约信息进行所述权益策略规则的决策;Making decisions on the equity strategy rules based on the contract signing information;基于所述第一网元的本地信息进行所述权益策略规则的决策。The equity policy rule is decided based on the local information of the first network element.5.根据权利要求1所述的方法,其特征在于,所述第一网元还用于对所述权益策略规则进行以下至少一项操作:5. The method according to claim 1, wherein the first network element is further configured to perform at least one of the following operations on the equity policy rule:下载所述权益策略规则;Download the equity strategy rules;导入所述权益策略规则;Import the equity strategy rules;生成所述权益策略规则;generating the equity strategy rules;存储所述权益策略规则;Storing the equity policy rules;增加所述权益策略规则;Adding the equity strategy rules;删除所述权益策略规则;Deleting the equity policy rule;激活所述权益策略规则;Activating the equity policy rules;去激活所述权益策略规则;Deactivating the equity policy rule;修改所述权益策略规则;Modify the equity strategy rules;更新所述权益策略规则。The equity policy rule is updated.6.根据权利要求1所述的方法,其特征在于,所述向第二网元发送所述权益策略规则,包括以下至少一项:6. The method according to claim 1, wherein the sending the equity policy rule to the second network element comprises at least one of the following:向所述第二网元发送第一规则,所述第一规则为包含所述权益策略规则的策略控制和计费规则;Sending a first rule to the second network element, where the first rule is a policy control and charging rule including the equity policy rule;向所述第二网元发送第二规则,所述第二规则为专用的权益策略规则;Sending a second rule to the second network element, where the second rule is a dedicated equity policy rule;向所述第二网元发送第三规则,所述第三规则包含所述权益策略规则信息元素。A third rule is sent to the second network element, where the third rule includes the equity policy rule information element.7.根据权利要求1所述的方法,其特征在于,所述权益策略规则包括以下至少一项:权益主体策略规则、权益划分策略规则、权益交易策略规则。7. The method according to claim 1, characterized in that the equity policy rules include at least one of the following: equity subject policy rules, equity division policy rules, and equity transaction policy rules.8.根据权利要求7所述的方法,其特征在于,所述权益主体策略规则用于保障网络中主体权益的合法性,所述权益主体策略规则至少包括以下至少一项:主体资质判断、主体合法性判断、法律法规、合同协议、主体身份认定。8. The method according to claim 7 is characterized in that the equity subject policy rules are used to ensure the legitimacy of the subject's rights and interests in the network, and the equity subject policy rules include at least one of the following: subject qualification judgment, subject legitimacy judgment, laws and regulations, contractual agreements, and subject identity verification.9.根据权利要求7所述的方法,其特征在于,所述权益划分策略规则用于对网络主体的权益进行划分,所述权益划分策略规则至少包括以下至少一项:资源的归属权、资源的修改权、资源的使用权、资产的归属权、资产的修改权、资产的使用权、服务的归属权、服务的修改权、服务的使用权、网络知情权、网络修改权、应获得的激励、应获得的奖励、应获得的分成。9. The method according to claim 7 is characterized in that the rights and interests division strategy rules are used to divide the rights and interests of network entities, and the rights and interests division strategy rules include at least one of the following: ownership rights of resources, modification rights of resources, use rights of resources, ownership rights of assets, modification rights of assets, use rights of assets, ownership rights of services, modification rights of services, use rights of services, network information rights, network modification rights, incentives to be obtained, rewards to be obtained, and shares to be obtained.10.根据权利要求7所述的方法,其特征在于,所述权益交易策略规则用于规定在交易过程中交易双方要遵从的规则,所述权益交易策略规则至少包括以下至少一项:第三方证明、交易平台、交易周期、交易是否可撤销、评分策略、账本选择、是否需要隐私保护、隐私保护的程度。10. The method according to claim 7 is characterized in that the equity trading strategy rules are used to specify the rules that the two parties to the transaction must follow during the transaction process, and the equity trading strategy rules include at least one of the following: third-party certification, trading platform, transaction cycle, whether the transaction is revocable, scoring strategy, ledger selection, whether privacy protection is required, and the degree of privacy protection.11.根据权利要求1所述的方法,其特征在于,所述权益策略规则包括以下至少一项:权益策略规则标识、权益策略规则索引、权益策略规则类型、权益主体标识、权益主体的权益。11. The method according to claim 1, characterized in that the equity policy rule includes at least one of the following: an equity policy rule identifier, an equity policy rule index, an equity policy rule type, an equity subject identifier, and the equity of the equity subject.12.根据权利要求1所述的方法,其特征在于,所述权益控制操作包括以下至少一项:12. The method according to claim 1, wherein the equity control operation comprises at least one of the following:基于所述权益策略规则生成权益控制参数;generating equity control parameters based on the equity policy rules;基于所述权益策略规则激活权益控制参数;activating equity control parameters based on the equity policy rules;基于所述权益策略规则将所述权益策略规则与一个数据流绑定;Binding the equity policy rule to a data stream based on the equity policy rule;存储所述权益策略规则;Storing the equity policy rules;基于所述权益策略规则激活一个权益策略规则;activating an equity policy rule based on the equity policy rule;基于所述权益策略规则去激活一个权益策略规则;activating an equity policy rule based on the equity policy rule;更新本地存储的权益策略规则;Update the locally stored equity policy rules;修改本地存储的权益策略规则;Modify the locally stored equity policy rules;基于所述权益策略规则选择第三网元;selecting a third network element based on the equity policy rule;向第三网元发送权益控制参数;Sending equity control parameters to the third network element;基于所述权益策略规则生成权益配置文件,所述权益配置文件包括权益控制参数;generating a rights and interests configuration file based on the rights and interests policy rules, wherein the rights and interests configuration file includes rights and interests control parameters;基于所述权益策略规则激活权益配置文件,所述权益配置文件包括权益控制参数;activating a rights profile based on the rights policy rules, the rights profile including rights control parameters;向第三网元发送权益配置文件,所述权益配置文件包括权益控制参数。Sending a rights and interests configuration file to a third network element, where the rights and interests configuration file includes rights and interests control parameters.13.根据权利要求12所述的方法,其特征在于,所述权益控制参数包括以下至少一项:权益主体标识、权益主体拥有的权益内容参数、权益审核参数、权益使用情况参数、权益预警参数、权益交易参数。13. The method according to claim 12 is characterized in that the equity control parameters include at least one of the following: equity subject identification, equity content parameters owned by the equity subject, equity review parameters, equity usage parameters, equity warning parameters, and equity transaction parameters.14.根据权利要求1所述的方法,其特征在于,所述第一网元为以下之一:权益策略规则管理网元、集中式权益管理网元、策略控制功能PCF、云服务中心、网络管理中心、权益策略规则代理、集中单元。14. The method according to claim 1 is characterized in that the first network element is one of the following: a rights and interests policy rule management network element, a centralized rights and interests management network element, a policy control function PCF, a cloud service center, a network management center, a rights and interests policy rule agent, and a centralized unit.15.根据权利要求1所述的方法,其特征在于,所述第二网元为以下之一:权益控制管理网元、分布式权益管理网元、会话管理功能SMF、接入和移动性管理功能AMF、任务管理网元、无线接入网RAN、集中单元CU、权益控制管理代理、分布单元DU。15. The method according to claim 1 is characterized in that the second network element is one of the following: a rights control management network element, a distributed rights management network element, a session management function SMF, an access and mobility management function AMF, a task management network element, a radio access network RAN, a centralized unit CU, a rights control management agent, and a distributed unit DU.16.根据权利要求4或12所述的方法,其特征在于,所述第三网元为以下之一:AMF、用户面功能UPF、RAN、终端、CU、DU、网络开放功能NEF、应用功能AF、权益执行网元。16. The method according to claim 4 or 12, characterized in that the third network element is one of the following: AMF, user plane function UPF, RAN, terminal, CU, DU, network open function NEF, application function AF, and rights execution network element.17.一种权益管理方法,其特征在于,应用于第二网元,所述方法包括:17. A rights management method, characterized in that it is applied to a second network element, the method comprising:接收第一网元发送的权益策略规则;receiving the equity policy rules sent by the first network element;基于所述权益策略规则进行网络中的权益控制操作。Equity control operations in the network are performed based on the equity policy rules.18.根据权利要求17所述的方法,其特征在于,所述接收第一网元发送的权益策略规则,包括以下至少一项:18. The method according to claim 17, wherein the receiving of the equity policy rule sent by the first network element comprises at least one of the following:接收所述第一网元发送的第一规则,所述第一规则为包含所述权益策略规则的策略控制和计费规则;receiving a first rule sent by the first network element, where the first rule is a policy control and charging rule including the equity policy rule;接收所述第一网元发送的第二规则,所述第二规则为专用的权益策略规则;receiving a second rule sent by the first network element, where the second rule is a dedicated equity policy rule;接收所述第二网元发送的第三规则,所述第三规则包含所述权益策略规则信息元素。A third rule sent by the second network element is received, where the third rule includes the equity policy rule information element.19.根据权利要求17所述的方法,其特征在于,所述基于所述权益策略规则进行网络中的权益控制操作,包括以下至少一项:19. The method according to claim 17, wherein the performing of the equity control operation in the network based on the equity policy rule comprises at least one of the following:基于所述权益策略规则生成权益控制参数;generating equity control parameters based on the equity policy rules;基于所述权益策略规则激活权益控制参数;activating equity control parameters based on the equity policy rules;基于所述权益策略规则将所述权益策略规则与一个数据流绑定;Binding the equity policy rule to a data stream based on the equity policy rule;存储所述权益策略规则;Storing the equity policy rules;基于所述权益策略规则激活一个权益策略规则;activating an equity policy rule based on the equity policy rule;基于所述权益策略规则去激活一个权益策略规则;activating an equity policy rule based on the equity policy rule;更新本地存储的权益策略规则;Update the locally stored equity policy rules;修改本地存储的权益策略规则;Modify the locally stored equity policy rules;基于所述权益策略规则选择第三网元;selecting a third network element based on the equity policy rule;向第三网元发送权益控制参数;Sending equity control parameters to the third network element;基于所述权益策略规则生成权益配置文件,所述权益配置文件包括权益控制参数;generating a rights and interests configuration file based on the rights and interests policy rules, wherein the rights and interests configuration file includes rights and interests control parameters;基于所述权益策略规则激活权益配置文件,所述权益配置文件包括权益控制参数;activating a rights profile based on the rights policy rules, the rights profile including rights control parameters;向第三网元发送权益配置文件,所述权益配置文件包括权益控制参数。Sending a rights and interests configuration file to a third network element, where the rights and interests configuration file includes rights and interests control parameters.20.根据权利要求19所述的方法,其特征在于,所述权益控制参数包括以下至少一项:权益主体标识、权益主体拥有的权益内容参数、权益审核参数、权益使用情况参数、权益预警参数、权益交易参数。20. The method according to claim 19, characterized in that the equity control parameters include at least one of the following: equity subject identification, equity content parameters owned by the equity subject, equity review parameters, equity usage parameters, equity warning parameters, and equity transaction parameters.21.根据权利要求17所述的方法,其特征在于,所述接收第一网元发送的权益策略规则之前,还包括:21. The method according to claim 17, characterized in that before receiving the equity policy rule sent by the first network element, the method further comprises:向所述第一网元发送第一请求消息,所述第一请求消息用于请求进行所述权益策略规则的决策;或者,Sending a first request message to the first network element, where the first request message is used to request a decision on the equity policy rule; or,基于预设条件向所述第一网元发送第一请求消息,所述第一请求消息用于请求进行所述权益策略规则的决策。A first request message is sent to the first network element based on a preset condition, where the first request message is used to request a decision on the equity policy rule.22.根据权利要求21所述的方法,其特征在于,所述预设条件至少包括以下至少一项:22. The method according to claim 21, wherein the preset condition includes at least one of the following:会话建立;Session establishment;终端上下文建立;Terminal context establishment;任务建立;Task establishment;满足权益触发条件,所述权益触发条件根据对网络中权益情况的监测确定;Satisfaction of the equity trigger conditions, which are determined based on monitoring of the equity situation in the network;接收到第三网元的指示信息,所述指示信息用于指示向所述第一网元发送第一请求消息。Instruction information from a third network element is received, where the instruction information is used to instruct sending a first request message to the first network element.23.根据权利要求17所述的方法,其特征在于,所述权益策略规则包括以下至少一项:权益主体策略规则、权益划分策略规则、权益交易策略规则。23. The method according to claim 17, wherein the equity policy rules include at least one of the following: equity subject policy rules, equity division policy rules, and equity transaction policy rules.24.根据权利要求23所述的方法,其特征在于,所述权益主体策略规则用于保障网络中主体权益的合法性,所述权益主体策略规则至少包括以下至少一项:主体资质判断、主体合法性判断、法律法规、合同协议、主体身份认定。24. The method according to claim 23 is characterized in that the equity subject policy rules are used to ensure the legitimacy of the subject's rights and interests in the network, and the equity subject policy rules include at least one of the following: subject qualification judgment, subject legitimacy judgment, laws and regulations, contractual agreements, and subject identity verification.25.根据权利要求23所述的方法,其特征在于,所述权益划分策略规则用于对网络主体的权益进行划分,所述权益划分策略规则至少包括以下至少一项:资源的归属权、资源的修改权、资源的使用权、资产的归属权、资产的修改权、资产的使用权、服务的归属权、服务的修改权、服务的使用权、网络知情权、网络修改权、应获得的激励、应获得的奖励、应获得的分成。25. The method according to claim 23 is characterized in that the rights and interests division strategy rules are used to divide the rights and interests of network entities, and the rights and interests division strategy rules include at least one of the following: ownership rights of resources, modification rights of resources, use rights of resources, ownership rights of assets, modification rights of assets, use rights of assets, ownership rights of services, modification rights of services, use rights of services, network information rights, network modification rights, incentives to be obtained, rewards to be obtained, and shares to be obtained.26.根据权利要求23所述的方法,其特征在于,所述权益交易策略规则用于规定在交易过程中交易双方要遵从的规则,所述权益交易策略规则至少包括以下至少一项:第三方证明、交易平台、交易周期、交易是否可撤销、评分策略、账本选择、是否需要隐私保护、隐私保护的程度。26. The method according to claim 23 is characterized in that the equity trading strategy rules are used to specify the rules that the two parties to the transaction must follow during the transaction process, and the equity trading strategy rules include at least one of the following: third-party certification, trading platform, transaction cycle, whether the transaction is revocable, scoring strategy, ledger selection, whether privacy protection is required, and the degree of privacy protection.27.根据权利要求17所述的方法,其特征在于,所述权益策略规则包括以下至少一项:权益策略规则标识、权益策略规则索引、权益策略规则类型、权益主体标识、权益主体的权益。27. The method according to claim 17, characterized in that the equity policy rule includes at least one of the following: an equity policy rule identifier, an equity policy rule index, an equity policy rule type, an equity subject identifier, and the equity of the equity subject.28.根据权利要求17所述的方法,其特征在于,所述第一网元为以下之一:权益策略规则管理网元、集中式权益管理网元、PCF、云服务中心、网络管理中心、权益策略规则代理、集中单元。28. The method according to claim 17 is characterized in that the first network element is one of the following: a rights policy rule management network element, a centralized rights management network element, a PCF, a cloud service center, a network management center, a rights policy rule agent, and a centralized unit.29.根据权利要求17所述的方法,其特征在于,所述第二网元为以下之一:权益控制管理网元、分布式权益管理网元、SMF、AMF、任务管理网元、RAN、CU、权益控制管理代理、DU。29. The method according to claim 17 is characterized in that the second network element is one of the following: equity control management network element, distributed equity management network element, SMF, AMF, task management network element, RAN, CU, equity control management agent, DU.30.根据权利要求19或22所述的方法,其特征在于,所述第三网元为以下之一:AMF、UPF、RAN、终端、CU、DU、NEF、AF、权益执行网元。30. The method according to claim 19 or 22 is characterized in that the third network element is one of the following: AMF, UPF, RAN, terminal, CU, DU, NEF, AF, and rights execution network element.31.一种权益管理方法,其特征在于,应用于第三网元,所述方法包括:31. A rights management method, characterized in that it is applied to a third network element, the method comprising:发送指示信息,所述指示信息用指示获取与所述第三网元相关的权益信息;Sending instruction information, where the instruction information is used to instruct acquisition of rights and interests information related to the third network element;接收所述权益信息。The equity information is received.32.根据权利要求31所述的方法,其特征在于,所述发送指示信息包括以下至少一项:32. The method according to claim 31, wherein the sending instruction information includes at least one of the following:向第一网元发送第一指示信息,所述第一指示信息用于指示所述第一网元配置权益策略规则;Sending first indication information to a first network element, where the first indication information is used to instruct the first network element to configure a rights and interests policy rule;向第二网元发送第二指示信息,所述第二指示信息用于指示所述第二网元请求所述第一网元配置权益策略规则;Sending second indication information to the second network element, where the second indication information is used to instruct the second network element to request the first network element to configure a rights and interests policy rule;向第二网元发送第三指示信息,所述第三指示信息用于指示所述第二网元激活权益策略规则;Sending third indication information to the second network element, where the third indication information is used to instruct the second network element to activate the equity policy rule;向第二网元发送第四指示信息,所述第四指示信息用于指示所述第二网元对所述第三网元进行权益控制操作。Fourth indication information is sent to the second network element, where the fourth indication information is used to instruct the second network element to perform an equity control operation on the third network element.33.根据权利要求31所述的方法,其特征在于,所述权益信息包括以下至少一项:33. The method according to claim 31, wherein the equity information includes at least one of the following:所述第三网元对应的权益信息;Rights and interests information corresponding to the third network element;和所述第三网元有交互的其他网元对应的权益信息;Rights and interests information corresponding to other network elements that interact with the third network element;和所述第三网元有交易的其他网元对应的权益信息。Equity information corresponding to other network elements that have transactions with the third network element.34.根据权利要求31所述的方法,其特征在于,所述第三网元为以下之一:AMF、UPF、RAN、终端、CU、DU、NEF、AF、权益执行网元。34. The method according to claim 31 is characterized in that the third network element is one of the following: AMF, UPF, RAN, terminal, CU, DU, NEF, AF, and rights execution network element.35.根据权利要求32所述的方法,其特征在于,所述第一网元为以下之一:权益策略规则管理网元、集中式权益管理网元、PCF、云服务中心、网络管理中心、权益策略规则代理、集中单元。35. The method according to claim 32 is characterized in that the first network element is one of the following: a rights policy rule management network element, a centralized rights management network element, a PCF, a cloud service center, a network management center, a rights policy rule agent, and a centralized unit.36.根据权利要求32所述的方法,其特征在于,所述第二网元为以下之一:权益控制管理网元、分布式权益管理网元、SMF、AMF、任务管理网元、RAN、CU、权益控制管理代理、DU。36. The method according to claim 32 is characterized in that the second network element is one of the following: equity control management network element, distributed equity management network element, SMF, AMF, task management network element, RAN, CU, equity control management agent, DU.37.一种通信装置,其特征在于,包括:存储器和处理器;存储器和处理器耦合;存储器用于存储所述处理器可执行的指令;所述处理器执行所述指令时执行如权利要求1至36中任一项所述的方法。37. A communication device, characterized in that it comprises: a memory and a processor; the memory and the processor are coupled; the memory is used to store instructions executable by the processor; when the processor executes the instructions, it performs the method according to any one of claims 1 to 36.38.一种计算机可读存储介质,其特征在于,所述计算机可读存储介质上存储有计算机指令,当所述计算机指令在通信装置上运行时,使得所述通信装置执行如权利要求1至36中任一项所述的方法。38. A computer-readable storage medium, characterized in that computer instructions are stored on the computer-readable storage medium, and when the computer instructions are executed on a communication device, the communication device executes the method according to any one of claims 1 to 36.
CN202410385258.1A2024-03-282024-03-28 Equity management method, device and storage mediumPendingCN120730257A (en)

Priority Applications (2)

Application NumberPriority DateFiling DateTitle
CN202410385258.1ACN120730257A (en)2024-03-282024-03-28 Equity management method, device and storage medium
PCT/CN2024/125567WO2025200387A1 (en)2024-03-282024-10-17Rights and interests management method, communication apparatus, and storage medium

Applications Claiming Priority (1)

Application NumberPriority DateFiling DateTitle
CN202410385258.1ACN120730257A (en)2024-03-282024-03-28 Equity management method, device and storage medium

Publications (1)

Publication NumberPublication Date
CN120730257Atrue CN120730257A (en)2025-09-30

Family

ID=97168359

Family Applications (1)

Application NumberTitlePriority DateFiling Date
CN202410385258.1APendingCN120730257A (en)2024-03-282024-03-28 Equity management method, device and storage medium

Country Status (2)

CountryLink
CN (1)CN120730257A (en)
WO (1)WO2025200387A1 (en)

Family Cites Families (5)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US10057775B2 (en)*2009-01-282018-08-21Headwater Research LlcVirtualized policy and charging system
US9961017B2 (en)*2014-08-082018-05-01Oracle International CorporationDemand policy-based resource management and allocation system
CN110324800B (en)*2018-03-302021-01-29华为技术有限公司 Method, network element and system for policy control
US11272513B2 (en)*2018-08-222022-03-08ANDRO Computational Solutions, LLCAdjudication of access policies in wireless device network
CN115967736A (en)*2021-10-082023-04-14中移(杭州)信息技术有限公司 Intelligent device control method, device and computer-readable storage medium

Also Published As

Publication numberPublication date
WO2025200387A1 (en)2025-10-02

Similar Documents

PublicationPublication DateTitle
CN114095579B (en)Network system for computing power processing, service processing method and equipment
Ouyang et al.The next decade of telecommunications artificial intelligence
CN108270823B (en)Service providing method, device and system
Refaey et al.A blockchain policy and charging control framework for roaming in cellular networks
Granelli et al.Standardization and research in cognitive and dynamic spectrum access networks: IEEE SCC41 efforts and other activities
US10298580B2 (en)Admission of an individual session in a network
KR100901872B1 (en)System and method for grid services based cooperation environment among heterogeneous nomadic and mobile networks
US7254387B2 (en)Management and control of telecommunication services delivery
Giupponi et al.Blockchain-enabled network sharing for o-ran
CN115297509B (en) A method and system for secondary splitting of edge computing
Di Pascale et al.Toward scalable user-deployed ultra-dense networks: Blockchain-enabled small cells as a service
Figetakis et al.Autonomous mec selection in federated next-gen networks via deep reinforcement learning
Aguiar et al.Pervasiveness in a competitive multi-operator environment: the Daidalos project
Raschellà et al.A Trust-Based Cooperative System for Efficient Wi-Fi Radio Access Networks
CN120730257A (en) Equity management method, device and storage medium
US20240187403A1 (en)Temporary identifiers for network and service access and for transaction recordation
Donertasli et al.Disaggregated Near-RT RIC control plane with unified 5G DB for NS, MEC and NWDAF integration
CN106506176B (en) Method and system for generating policy and charging rules
Roopa et al.Smart contract implementation on network sharing for 6G wireless networks
CN114245441A (en)5G networking method and system capable of meeting object and human scenes simultaneously
Zheng et al.Smart contract-based secure spectrum sharing in multi-operators wireless communication networks
CN114978948B (en)Evaluation method, device, equipment and storage of network element bearing network slicing service
CN118537003B (en) A method for ensuring financial transaction security and transparency based on blockchain
CN120730258A (en)Rights management method, device and storage medium
US20250311016A1 (en)Proxy enterprise cellular access network visibility

Legal Events

DateCodeTitleDescription
PB01Publication

[8]ページ先頭

©2009-2025 Movatter.jp