[go: up one dir, main page]

CN117354868A - Private network system, private network data processing method, private network access method and device - Google Patents

Private network system, private network data processing method, private network access method and device Download PDF

Info

Publication number
CN117354868A
CN117354868A CN202311482136.6A CN202311482136A CN117354868A CN 117354868 A CN117354868 A CN 117354868A CN 202311482136 A CN202311482136 A CN 202311482136A CN 117354868 A CN117354868 A CN 117354868A
Authority
CN
China
Prior art keywords
data
base station
private network
equipment
authentication
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202311482136.6A
Other languages
Chinese (zh)
Inventor
梁健
付明超
张丁
刘瑜亮
蒋海群
李晓波
方雨
刘士卿
洪建军
欧佳佳
董倩莹
谢玉芬
刘震
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
China United Network Communications Group Co Ltd
Original Assignee
China United Network Communications Group Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by China United Network Communications Group Co Ltd filed Critical China United Network Communications Group Co Ltd
Priority to CN202311482136.6A priority Critical patent/CN117354868A/en
Publication of CN117354868A publication Critical patent/CN117354868A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W28/00Network traffic management; Network resource management
    • H04W28/02Traffic management, e.g. flow control or congestion control
    • H04W28/08Load balancing or load distribution
    • H04W28/09Management thereof
    • H04W28/0925Management thereof using policies
    • H04W28/0942Management thereof using policies based on measured or predicted load of entities- or links
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W40/00Communication routing or communication path finding
    • H04W40/02Communication route or path selection, e.g. power-based or shortest path routing
    • H04W40/22Communication route or path selection, e.g. power-based or shortest path routing using selective relaying for reaching a BTS [Base Transceiver Station] or an access point
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D30/00Reducing energy consumption in communication networks
    • Y02D30/70Reducing energy consumption in communication networks in wireless communication networks

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

本申请提供一种专网系统、专网数据处理方法、专网接入方法及装置,涉及通信技术领域,用于提高专网数据传输的灵活性与安全性。该系统包括:基站设备、核心网设备、边缘节点和中继设备。其中,基站设备与边缘节点之间通信连接;边缘节点与中继设备之间通信连接;核心网设备与基站设备之间通信连接;核心网设备与中继设备之间通信连接;基站设备,用于接收终端设备发送的数据,并确定数据所需的算力资源;边缘节点,用于接收基站设备发送的数据,并对数据进行处理,得到处理后的数据;核心网设备,用于接收基站设备发送的数据,并对数据进行处理,得到处理后的数据;中继设备,用于将处理后的数据,传输到数据中心。

This application provides a private network system, a private network data processing method, a private network access method and a device, which relate to the field of communication technology and are used to improve the flexibility and security of private network data transmission. The system includes: base station equipment, core network equipment, edge nodes and relay equipment. Among them, the communication connection between the base station equipment and the edge node; the communication connection between the edge node and the relay equipment; the communication connection between the core network equipment and the base station equipment; the communication connection between the core network equipment and the relay equipment; the base station equipment, with It is used to receive the data sent by the terminal equipment and determine the computing resources required for the data; the edge node is used to receive the data sent by the base station equipment and process the data to obtain the processed data; the core network equipment is used to receive the base station The data sent by the device is processed and the processed data is obtained; the relay device is used to transmit the processed data to the data center.

Description

专网系统、专网数据处理方法、专网接入方法及装置Private network system, private network data processing method, private network access method and device

技术领域Technical field

本申请涉及通信技术领域,尤其涉及一种专网系统、专网数据处理方法、专网接入方法及装置。The present application relates to the field of communication technology, and in particular to a private network system, a private network data processing method, a private network access method and a device.

背景技术Background technique

随着第五代移动通信技术(5th generation mobile networks,5G)专网的应用场景越来越广泛,智慧工厂、智慧城市、智慧医疗、智慧文旅、移动办公等领域都将受益于5G专网的发展。As the fifth generation mobile communications technology (5th generation mobile networks, 5G) private network application scenarios become more and more widespread, smart factories, smart cities, smart medical care, smart cultural tourism, mobile office and other fields will benefit from 5G private networks. development of.

对于专网数据处理方面,在专网数据体量较大,5G专网无法进行处理的情况下,相关技术需要从专网切换到公网进行处理,但是,在切换过程中,数据传输可能会中断或被窃取,从而带来安全风险。此外,在切换时,用户需要重新建立连接,可能会降低服务的灵活性。For private network data processing, when the private network data volume is large and the 5G private network cannot process it, the relevant technology needs to switch from the private network to the public network for processing. However, during the switching process, data transmission may be delayed. interrupted or stolen, posing a security risk. In addition, when switching, users need to re-establish the connection, which may reduce the flexibility of the service.

综上所述,相关技术提供的5G专网,在配置和使用上存在一定的灵活性和安全性问题。To sum up, the 5G private network provided by related technologies has certain flexibility and security issues in configuration and use.

发明内容Contents of the invention

本申请提供一种专网系统、专网数据处理方法、专网接入方法及装置,用于提高专网数据传输的灵活性与安全性。This application provides a private network system, a private network data processing method, a private network access method and a device to improve the flexibility and security of private network data transmission.

第一方面,本申请提供了一种专网系统,包括:基站设备、核心网设备、边缘节点和中继设备。其中,基站设备与边缘节点之间通信连接;边缘节点与中继设备之间通信连接;核心网设备与基站设备之间通信连接;核心网设备与中继设备之间通信连接;基站设备,用于接收终端设备发送的数据,并确定数据所需的算力资源;在数据所需的算力资源大于预设阈值的情况下,将数据发送给边缘节点;在数据所需的算力资源小于或等于预设阈值的情况下,将数据发送给核心网设备;边缘节点,用于接收基站设备发送的数据,并对数据进行处理,得到处理后的数据;核心网设备,用于接收基站设备发送的数据,并对数据进行处理,得到处理后的数据;中继设备,用于将处理后的数据,传输到数据中心。In the first aspect, this application provides a private network system, including: base station equipment, core network equipment, edge nodes and relay equipment. Among them, the communication connection between the base station equipment and the edge node; the communication connection between the edge node and the relay equipment; the communication connection between the core network equipment and the base station equipment; the communication connection between the core network equipment and the relay equipment; the base station equipment, with It is used to receive the data sent by the terminal device and determine the computing resources required for the data; when the computing resources required for the data are greater than the preset threshold, the data is sent to the edge node; when the computing resources required for the data are less than Or equal to the preset threshold, the data is sent to the core network equipment; the edge node is used to receive the data sent by the base station equipment, and processes the data to obtain the processed data; the core network equipment is used to receive the base station equipment The data is sent, and the data is processed to obtain the processed data; the relay device is used to transmit the processed data to the data center.

本申请实施例提供的专网系统至少带来以下有益效果:本申请提供了一种由基站设备、核心网设备、边缘节点和中继设备组建而成的专网系统。其中,在该专网系统进行数据传输的过程中,能够根据传输数据所需的算力资源的大小,自动选择传输路径,例如,在数据所需的算力资源大于预设阈值的情况下,数据通过边缘节点进行数据传输;在数据所需的算力资源小于或等于算力资源的情况下,数据通过核心网设备进行传输。可以理解的是,本申请提供的专网系统可以动态地根据数据所需的算力资源来决定将数据发送到边缘节点还是核心网设备,从而更有效地利用网络资源。其次,当数据所需的算力资源大于预设阈值时,数据发送到边缘节点,这样可以减轻核心网设备的负担,优化算力资源的使用,且无需进行公网专网之间的切换,提供了更大的灵活性,能够提高用户使用体验。再者,由于边缘节点具有更强的安全防护能力,可以更好地保护数据的安全性。The private network system provided by the embodiments of this application at least brings the following beneficial effects: This application provides a private network system composed of base station equipment, core network equipment, edge nodes and relay equipment. Among them, during the data transmission process of the private network system, the transmission path can be automatically selected according to the size of the computing power resources required to transmit the data. For example, when the computing power resources required for the data are greater than the preset threshold, Data is transmitted through edge nodes; when the computing power resources required for the data are less than or equal to the computing power resources, the data is transmitted through the core network equipment. It can be understood that the private network system provided by this application can dynamically decide whether to send data to edge nodes or core network equipment based on the computing resources required for the data, thereby utilizing network resources more effectively. Secondly, when the computing resources required for the data are greater than the preset threshold, the data is sent to the edge node, which can reduce the burden on the core network equipment, optimize the use of computing resources, and eliminate the need to switch between public and private networks. Provides greater flexibility and improves user experience. Furthermore, because edge nodes have stronger security protection capabilities, data security can be better protected.

作为一种可能的实现方式,中继设备,还用于对数据承载的信号进行放大。As a possible implementation method, relay equipment is also used to amplify the signal carried by the data.

作为一种可能的实现方式,中继设备,具体用于通过5G公网将处理后的数据传输到数据中心。As a possible implementation method, relay equipment is specifically used to transmit processed data to the data center through the 5G public network.

作为一种可能的实现方式,中继设备,具体用于通过卫星将处理后的数据传输到数据中心。As a possible implementation method, relay equipment is specifically used to transmit processed data to the data center through satellites.

第二方面,本申请提供了一种专网数据处理方法,应用于上述第一方面提供的专网系统;该方法包括:基站设备接收终端设备发送的数据,并确定数据所需的算力资源;在数据所需的算力资源大于预设阈值的情况下,基站设备将数据发送给边缘节点,以使得边缘节点对数据进行处理,得到处理后的数据;在数据所需的算力资源小于或等于预设阈值的情况下,基站设备将数据发送给核心网设备,以使得核心网设备对数据进行处理,得到处理后的数据。In a second aspect, this application provides a private network data processing method, which is applied to the private network system provided in the first aspect; the method includes: a base station device receives data sent by a terminal device, and determines the computing resources required for the data. ; When the computing power resources required for the data are greater than the preset threshold, the base station device sends the data to the edge node, so that the edge node processes the data and obtains the processed data; when the computing power resources required for the data are less than or equal to the preset threshold, the base station device sends the data to the core network device, so that the core network device processes the data and obtains the processed data.

本申请实施例提供的技术方案至少带来以下有益效果:本申请首先通过基站设备接收终端设备发送的数据,并确定数据所需的算力资源;然后在数据所需的算力资源大于预设阈值的情况下,基站设备将数据发送给边缘节点,以使得边缘节点对数据进行处理,得到处理后的数据;在数据所需的算力资源小于或等于预设阈值的情况下,基站设备将数据发送给核心网设备,以使得核心网设备对数据进行处理,得到处理后的数据。可以理解的是,本申请提供的专网数据处理方法可以动态地根据数据所需的算力资源来决定将数据发送到边缘节点还是核心网设备,从而更有效地利用网络资源。其次,当数据所需的算力资源大于预设阈值时,数据发送到边缘节点,这样可以减轻核心网设备的负担,优化算力资源的使用,且无需进行公网专网之间的切换,提供了更大的灵活性,能够提高用户使用体验。再者,由于边缘节点具有更强的安全防护能力,可以更好地保护数据的安全性。The technical solutions provided by the embodiments of this application at least bring the following beneficial effects: This application first receives the data sent by the terminal equipment through the base station equipment, and determines the computing power resources required for the data; then, when the computing power resources required for the data are greater than the preset In the case of a threshold, the base station equipment sends the data to the edge node, so that the edge node processes the data and obtains the processed data; when the computing power resources required for the data are less than or equal to the preset threshold, the base station equipment will The data is sent to the core network device, so that the core network device processes the data and obtains processed data. It can be understood that the private network data processing method provided by this application can dynamically decide whether to send the data to the edge node or the core network device based on the computing resources required for the data, thereby making more effective use of network resources. Secondly, when the computing resources required for the data are greater than the preset threshold, the data is sent to the edge node, which can reduce the burden on the core network equipment, optimize the use of computing resources, and eliminate the need to switch between public and private networks. Provides greater flexibility and improves user experience. Furthermore, because edge nodes have stronger security protection capabilities, data security can be better protected.

第三方面,本申请提供了一种专网接入方法,应用于上述第一方面提供的专网系统;该方法包括:基站设备接收终端设备发送的接入认证请求,并基于接入认证请求进行接入认证;其中,接入认证包括以下至少一项:主认证、二次认证和端到端认证。In a third aspect, this application provides a private network access method, which is applied to the private network system provided in the first aspect; the method includes: the base station device receives an access authentication request sent by the terminal device, and performs the authentication based on the access authentication request. Perform access authentication; where access authentication includes at least one of the following: primary authentication, secondary authentication, and end-to-end authentication.

本申请实施例提供的技术方案至少带来以下有益效果:本申请通过基站设备接收终端设备发送的接入认证请求,并基于接入认证请求进行接入认证,可以确保只有经过身份验证的用户才能使用网络服务,防止未经授权的终端设备接入网络,能够减少网络安全风险,提高网络的安全性。The technical solution provided by the embodiments of this application at least brings the following beneficial effects: This application receives the access authentication request sent by the terminal device through the base station equipment, and performs access authentication based on the access authentication request, which can ensure that only authenticated users can Using network services to prevent unauthorized terminal devices from accessing the network can reduce network security risks and improve network security.

第四方面,本申请提供了一种专网数据处理装置,应用于基站设备;该装置包括:确定模块,用于接收终端设备发送的数据,并确定数据所需的算力资源;发送模块,用于在数据所需的算力资源大于预设阈值的情况下,将数据发送给边缘节点,以使得边缘节点对数据进行处理,得到处理后的数据;发送模块,还用于在数据所需的算力资源小于或等于预设阈值的情况下,将数据发送给核心网设备,以使得核心网设备对数据进行处理,得到处理后的数据。In the fourth aspect, this application provides a private network data processing device, which is applied to base station equipment; the device includes: a determination module, used to receive data sent by the terminal equipment and determine the computing resources required for the data; a sending module, It is used to send the data to the edge node when the computing power resources required by the data are greater than the preset threshold, so that the edge node processes the data and obtains the processed data; the sending module is also used to send the data when the data is required. When the computing power resources are less than or equal to the preset threshold, the data is sent to the core network device, so that the core network device processes the data and obtains the processed data.

第五方面,本申请提供了一种专网接入装置,应用于基站设备;该装置包括:认证模块,用于接收终端设备发送的接入认证请求,并基于接入认证请求进行接入认证;其中,接入认证包括以下至少一项:主认证、二次认证和端到端认证。In the fifth aspect, this application provides a private network access device, which is applied to base station equipment; the device includes: an authentication module, used to receive an access authentication request sent by a terminal device, and perform access authentication based on the access authentication request. ; Among them, access authentication includes at least one of the following: primary authentication, secondary authentication and end-to-end authentication.

第六方面,本申请提供了一种电子设备,包括处理器和存储器,处理器与存储器耦合;存储器用于存储计算机指令,计算机指令由处理器加载并执行以使计算机设备实现如第二方面和第三方面中任一项的方法。In a sixth aspect, the present application provides an electronic device, including a processor and a memory. The processor is coupled to the memory; the memory is used to store computer instructions, and the computer instructions are loaded and executed by the processor to enable the computer device to implement the second aspect and Methods of any of the third aspects.

第七方面,本申请提供了一种计算机可读存储介质,计算机可读存储介质包括计算机执行指令,当计算机执行指令在计算机上运行时,使得计算机执行第二方面和第三方面中任一项的方法。In a seventh aspect, the present application provides a computer-readable storage medium. The computer-readable storage medium includes computer-executable instructions. When the computer-executable instructions are run on a computer, they cause the computer to execute any one of the second aspect and the third aspect. Methods.

本申请中第四方面至第七方面的描述,可以参考第一方面至第三方面的详细描述;并且,第四方面至第七方面的描述的有益效果,可以参考第一方面至第三方面的有益效果分析,此处不再赘述。For descriptions of the fourth to seventh aspects in this application, reference may be made to the detailed descriptions of the first to third aspects; and for the beneficial effects of the descriptions of the fourth to seventh aspects, reference may be made to the first to third aspects. The analysis of beneficial effects will not be repeated here.

附图说明Description of drawings

图1为根据一些实施例的一种专网系统架构示意图;Figure 1 is a schematic diagram of a private network system architecture according to some embodiments;

图2为根据一些实施例的一种专网数据传输架构示意图一;Figure 2 is a schematic diagram 1 of a private network data transmission architecture according to some embodiments;

图3为根据一些实施例的一种专网数据传输架构示意图二;Figure 3 is a schematic diagram 2 of a private network data transmission architecture according to some embodiments;

图4为根据一些实施例的专网数据处理流程图;Figure 4 is a flow chart of private network data processing according to some embodiments;

图5为根据一些实施例的一种专网接入方法流程图;Figure 5 is a flow chart of a private network access method according to some embodiments;

图6为根据一些实施例的一种安全认证架构示意图;Figure 6 is a schematic diagram of a security authentication architecture according to some embodiments;

图7为根据一些实施例的一种主认证安全架构示意图;Figure 7 is a schematic diagram of a primary authentication security architecture according to some embodiments;

图8为根据一些实施例的一种3GPP接入与非3GPP接入形式示意图;Figure 8 is a schematic diagram of a 3GPP access and non-3GPP access form according to some embodiments;

图9为根据一些实施例的一种二次认证的架构示意图;Figure 9 is an architectural schematic diagram of a secondary authentication according to some embodiments;

图10为根据一些实施例的一种端到端认证场景示意图一;Figure 10 is a schematic diagram 1 of an end-to-end authentication scenario according to some embodiments;

图11为根据一些实施例的一种端到端认证场景示意图二;Figure 11 is a schematic diagram 2 of an end-to-end authentication scenario according to some embodiments;

图12为根据一些实施例的一种端到端认证场景示意图三;Figure 12 is a schematic diagram 3 of an end-to-end authentication scenario according to some embodiments;

图13为根据一些实施例的一种端到端认证场景示意图四;Figure 13 is a schematic diagram 4 of an end-to-end authentication scenario according to some embodiments;

图14为根据一些实施例的一种专网数据处理装置的结构示意图;Figure 14 is a schematic structural diagram of a private network data processing device according to some embodiments;

图15为根据一些实施例的一种专网接入装置的结构示意图;Figure 15 is a schematic structural diagram of a private network access device according to some embodiments;

图16为根据一些实施例的一种专网数据处理和专网接入结构示意图。Figure 16 is a schematic structural diagram of private network data processing and private network access according to some embodiments.

具体实施方式Detailed ways

下面将结合附图对本申请提供的一种专网系统进行详细的描述。A private network system provided by this application will be described in detail below with reference to the accompanying drawings.

本文中术语“和/或”,仅仅是一种描述关联对象的关联关系,表示可以存在三种关系,例如,A和/或B,可以表示:单独存在A,同时存在A和B,单独存在B这三种情况。The term "and/or" in this article is just an association relationship that describes related objects, indicating that three relationships can exist. For example, A and/or B can mean: A exists alone, A and B exist simultaneously, and they exist alone. B these three situations.

本申请的说明书以及附图中的术语“第一”和“第二”等是用于区别不同的对象,或者用于区别对同一对象的不同处理,而不是用于描述对象的特定顺序。The terms “first” and “second” in the description of this application and the drawings are used to distinguish different objects, or to distinguish different processes on the same object, rather than to describe a specific order of objects.

此外,本申请的描述中所提到的术语“包括”和“具有”以及它们的任何变形,意图在于覆盖不排他的包含。例如包含了一系列步骤或单元的过程、方法、系统、产品或设备没有限定于已列出的步骤或单元,而是可选的还包括其他没有列出的步骤或单元,或可选的还包括对于这些过程、方法、产品或设备固有的其它步骤或单元。Furthermore, references to the terms "including" and "having" and any variations thereof in the description of this application are intended to cover non-exclusive inclusion. For example, a process, method, system, product or device that includes a series of steps or units is not limited to the listed steps or units, but optionally includes other unlisted steps or units, or optionally also includes Includes other steps or units that are inherent to such processes, methods, products, or devices.

需要说明的是,本申请实施例中,“示例性的”或者“例如”等词用于表示作例子、例证或说明。本申请实施例中被描述为“示例性的”或者“例如”的任何实施例或设计方案不应被解释为比其它实施例或设计方案更优选或更具优势。确切而言,使用“示例性的”或者“例如”等词旨在以具体方式呈现相关概念。It should be noted that in the embodiments of this application, words such as "exemplary" or "for example" are used to represent examples, illustrations or explanations. Any embodiment or design described as "exemplary" or "such as" in the embodiments of the present application is not to be construed as preferred or advantageous over other embodiments or designs. Rather, use of the words "exemplary" or "such as" is intended to present the concept in a concrete manner.

在本申请的描述中,除非另有说明,“多个”的含义是指两个或两个以上。In the description of this application, unless otherwise stated, the meaning of "plurality" means two or more.

如背景技术所述,随着5G专网的应用场景越来越广泛,智慧工厂、智慧城市、智慧医疗、智慧文旅、移动办公等领域都将受益于5G专网的发展。在这样的情况下,相关技术中,5G专网针对不同场景的需求提供了全面的解决方案。As mentioned in the background technology, as the application scenarios of 5G private networks become more and more extensive, fields such as smart factories, smart cities, smart medical care, smart cultural tourism, and mobile office will all benefit from the development of 5G private networks. Under such circumstances, among related technologies, 5G private network provides comprehensive solutions for the needs of different scenarios.

在一些实施例中,用户无需更换手机号码和用户识别卡(subscriber identitymodule,SIM),便可以在公网和专网之间无缝切换。同时,中国联通5G专网还提供了免虚拟专用网络(virtual private network,VPN)接入内、外网的功能,能够实现广域漫游接入。在数据安全方面,5G专网通过用户面功能(user plane function,UPF)的本地分流技术,确保企业内网流量不经过互联网,从而保证了数据的安全性和可靠性。此外,5G专网还提供了人网和物网业务协同管理的功能,实现了更加高效和智能化的管理。同时,5G专网还提供了集中运维、及时响应、24小时现场维修等优势服务,为企业提供了更加全面和专业的服务支持。In some embodiments, users can seamlessly switch between the public network and the private network without changing their mobile phone number and subscriber identity module (SIM). At the same time, China Unicom's 5G private network also provides virtual private network (VPN)-free access to internal and external networks, enabling wide-area roaming access. In terms of data security, the 5G private network uses the local offloading technology of user plane function (UPF) to ensure that corporate intranet traffic does not pass through the Internet, thereby ensuring data security and reliability. In addition, the 5G private network also provides the function of collaborative management of human and Internet of Things services, achieving more efficient and intelligent management. At the same time, the 5G private network also provides advantageous services such as centralized operation and maintenance, timely response, and 24-hour on-site maintenance, providing enterprises with more comprehensive and professional service support.

现有技术对5G专网架构的研究主要在于对专网的配置上,例如5G专网的配置装置首先获取目标区域内的多个终端设备对5G专网的网络性能需求,从而确定目标区域内待建设的基站设备的数量,然后配置装置根据多个终端设备对5G专网的网络性能需求,确定待建设的基站设备的配置信息。可以看出,现有技术对5G专网架构的研究只停留在对专网的配置上,缺乏整体性的研究和创新。The existing research on 5G private network architecture mainly focuses on the configuration of the private network. For example, the configuration device of the 5G private network first obtains the network performance requirements of multiple terminal devices in the target area for the 5G private network, thereby determining the network performance requirements of the 5G private network in the target area. The number of base station equipment to be built, and then the configuration device determines the configuration information of the base station equipment to be built based on the network performance requirements of multiple terminal equipment for the 5G private network. It can be seen that the existing research on 5G private network architecture only focuses on the configuration of the private network and lacks overall research and innovation.

对于专网数据处理方面,在专网数据体量较大,5G专网无法进行处理的情况下,相关技术需要从专网切换到公网进行处理。但是,在切换的过程中,数据传输可能会中断或被窃取,从而带来安全风险。此外,在切换过程中,用户需要重新建立连接,可能会降低服务的灵活性。For private network data processing, when the private network data volume is large and the 5G private network cannot process it, the relevant technology needs to be switched from the private network to the public network for processing. However, during the switching process, data transmission may be interrupted or stolen, posing security risks. In addition, during the switching process, users need to re-establish connections, which may reduce the flexibility of the service.

综上所述,相关技术提供的5G专网,在配置和使用上存在一定的灵活性和安全性问题。To sum up, the 5G private network provided by related technologies has certain flexibility and security issues in configuration and use.

针对上述技术问题,本申请实施例提供了一种专网系统,具体包括:本申请提供了一种由基站设备、核心网设备、边缘节点和中继设备组建而成的专网系统。其中,在该专网系统进行数据传输的过程中,能够根据传输数据所需的算力资源的大小,自动选择传输路径,例如,在数据所需的算力资源大于预设阈值的情况下,数据通过边缘节点进行数据传输;在数据所需的算力资源小于或等于算力资源的情况下,数据通过核心网设备进行传输。可以理解的是,本申请提供的专网系统可以动态地根据数据所需的算力资源来决定将数据发送到边缘节点还是核心网设备,从而更有效地利用网络资源。其次,当数据所需的算力资源大于预设阈值时,数据发送到边缘节点,这样可以减轻核心网设备的负担,优化算力资源的使用,且无需进行公网专网之间的切换,提供了更大的灵活性,能够提高用户使用体验。再者,由于边缘节点具有更强的安全防护能力,可以更好地保护数据的安全性。In response to the above technical problems, embodiments of the present application provide a private network system, which specifically includes: This application provides a private network system composed of base station equipment, core network equipment, edge nodes, and relay equipment. Among them, during the data transmission process of the private network system, the transmission path can be automatically selected according to the size of the computing power resources required to transmit the data. For example, when the computing power resources required for the data are greater than the preset threshold, Data is transmitted through edge nodes; when the computing power resources required for the data are less than or equal to the computing power resources, the data is transmitted through the core network equipment. It can be understood that the private network system provided by this application can dynamically decide whether to send data to edge nodes or core network equipment based on the computing resources required for the data, thereby utilizing network resources more effectively. Secondly, when the computing resources required for the data are greater than the preset threshold, the data is sent to the edge node, which can reduce the burden on the core network equipment, optimize the use of computing resources, and eliminate the need to switch between public and private networks. Provides greater flexibility and improves user experience. Furthermore, because edge nodes have stronger security protection capabilities, data security can be better protected.

下面结合说明书附图,对本申请提供的实施例进行具体介绍。The embodiments provided in this application will be specifically introduced below in conjunction with the accompanying drawings of the description.

如图1所示,为本申请实施例提供的一种专网系统架构示意图。如图1所示,该专网架构包括:基站设备100、核心网设备200、边缘节点300和中继设备400。其中,基站设备100与边缘节点300之间通信连接,边缘节点300与中继设备400通信连接,核心网设备200与基站设备100之间通信连接,核心网设备200与中继设备400之间通信连接。As shown in Figure 1, it is a schematic diagram of a private network system architecture provided by an embodiment of the present application. As shown in Figure 1, the private network architecture includes: base station equipment 100, core network equipment 200, edge nodes 300 and relay equipment 400. Among them, the communication connection between the base station equipment 100 and the edge node 300, the communication connection between the edge node 300 and the relay equipment 400, the communication connection between the core network equipment 200 and the base station equipment 100, and the communication between the core network equipment 200 and the relay equipment 400 connect.

基站设备100,用于发送和接收无线信号。Base station equipment 100 is used for sending and receiving wireless signals.

在本申请实施例中,基站设备100,用于接收终端设备发送的数据,并将接收到的数据向核心网设备200或边缘节点300发送。In this embodiment of the present application, the base station device 100 is configured to receive data sent by the terminal device, and send the received data to the core network device 200 or the edge node 300.

其中,终端设备是与用户进行人机交互的设备,用户在与终端设备进行人机交互的过程中产生用户行为数据。示例性的,终端设备可以是手机、平板电脑、桌面型、膝上型、手持计算机、笔记本电脑、超级移动个人计算机(ultra-mobile personal computer,UMPC)、上网本,以及蜂窝电话、个人数字助理(personal digital assistant,PDA)、增强现实(augmented reality,AR)\虚拟现实(virtual reality,VR)设备等。本申请实施例对该终端设备的具体形态不作特殊限制。其可以与用户通过键盘、触摸板、触摸屏、遥控器、语音交互或手写设备等一种或多种方式进行人机交互。Among them, the terminal device is a device that performs human-computer interaction with the user, and the user generates user behavior data during the human-computer interaction with the terminal device. For example, the terminal device may be a mobile phone, a tablet computer, a desktop, a laptop, a handheld computer, a notebook computer, an ultra-mobile personal computer (UMPC), a netbook, as well as a cellular phone, a personal digital assistant ( personal digital assistant (PDA), augmented reality (AR)\virtual reality (VR) equipment, etc. The embodiment of the present application places no special restrictions on the specific form of the terminal device. It can interact with users through one or more methods such as keyboard, touch pad, touch screen, remote control, voice interaction or handwriting device.

在一些实施例中,基站设备100具体用于基于数据所需的算力资源的大小,确定数据传输路径。在数据所需的算力资源大于预设阈值的情况下,基站设备100将数据发送给所述边缘节点300;在数据所需的算力资源小于或等于预设阈值的情况下,基站设备100将数据发送给所述核心网设备200。In some embodiments, the base station device 100 is specifically configured to determine a data transmission path based on the size of the computing resources required for the data. When the computing power resources required for the data are greater than the preset threshold, the base station device 100 sends the data to the edge node 300; when the computing power resources required for the data are less than or equal to the preset threshold, the base station device 100 Send the data to the core network device 200.

在一些实施例中,无线接入网承载于基站设备。示例性的,在本申请实施例中,无线接入网设备是小型化5G基站设备(gnodeb,gNB)。小型化5G基站设备向终端设备提供新空口(new radio,NR)用户面和控制面协议,用于加密数据、控制和分配无线资源,以及对信息进行调度。此外,小型化5G基站设备还与核心网的网元进行链接,以实现与核心网络的通信和控制。In some embodiments, the radio access network is carried by base station equipment. For example, in this embodiment of the present application, the radio access network equipment is a miniaturized 5G base station equipment (gnodeb, gNB). Miniaturized 5G base station equipment provides new radio (NR) user plane and control plane protocols to terminal equipment for encrypting data, controlling and allocating wireless resources, and scheduling information. In addition, the miniaturized 5G base station equipment is also linked to the network elements of the core network to achieve communication and control with the core network.

核心网设备200,用于接收所述基站设备发送的数据,并对数据进行处理,得到处理后的所述数据。The core network device 200 is configured to receive data sent by the base station device, process the data, and obtain the processed data.

在一些实施例中,核心网设备200包括多个核心网网元(或者称为网络功能(network function,NF)网元)。示例性的,如图2所示,核心网设备包括:会话管理功能(session management function,SMF)网元、用户面功能(user plane function,UPF)网元、接入与移动性管理(access and mobility management function,AMF)网元、鉴权服务功能(authentication server function,AUSF)网元和统一数据管理(unified datamanagement,UDM)网元。此外,核心网还可以包括一些其他为示出的网元,例如策略控制功能(policy control function,PCF)网元、多接入边缘计算(multi-access edgecomputing,MEC)网元等,本申请实施例在此不予赘述。In some embodiments, the core network device 200 includes multiple core network elements (or network function (NF) elements). Exemplarily, as shown in Figure 2, the core network equipment includes: session management function (SMF) network element, user plane function (UPF) network element, access and mobility management (access and mobility management) network element. Mobility management function (AMF) network element, authentication server function (AUSF) network element and unified data management (UDM) network element. In addition, the core network may also include some other network elements (not shown), such as policy control function (PCF) network elements, multi-access edge computing (MEC) network elements, etc. This application implements The example will not be repeated here.

其中,AMF网元用于接收和处理终端设备发送的连接和会话等信息,并将会话管理相关的信息发送给SMF。Among them, the AMF network element is used to receive and process connection and session information sent by the terminal device, and send session management-related information to the SMF.

SMF网元用于负责与分离的数据面交互、创建、更新协议数据单元(protocol dataunit session,PDU)会话,并管理与UPF的会话的环境。SMF网元还用于控制UPF的路由选择和数据通知。The SMF network element is used to interact with the separated data plane, create and update the protocol data unit (protocol data unit session, PDU) session, and manage the session environment with UPF. The SMF network element is also used to control UPF routing and data notification.

UPF网元是移动网络和数据网络的连接点,用于负责5G核心网用户面数据包的路由和转发、数据和业务识别以及动作和策略执行。The UPF network element is the connection point between the mobile network and the data network and is responsible for routing and forwarding of 5G core network user plane data packets, data and service identification, and action and policy execution.

AUSF网元用于提供终端设备鉴权和保护控制信息列表。The AUSF network element is used to provide terminal device authentication and protection control information lists.

UDN网元用于管理用户标识、签约数据、鉴权数据和用户的服务网元的注册。UDN network elements are used to manage user identification, subscription data, authentication data and registration of users' service network elements.

在一些实施例中,核心网设备200可以通过网络开发功能(network exposurefunction,NEF)网元与第三方应用功能(application function,AF)网元进行连接。其中,NEF网元负责管理对外开放网络数据的,例如,向第三方应用提供核心网的内部数据。NEF网元还用于提供相应的安全保障来保证外部应用到第三代合作伙伴计划(3rd generationpartnership project,3GPP)网络的安全,提供外部应用服务质量(quality of service,QOS)定制能力开放、移动性状态事件订阅、AF请求分发等功能。In some embodiments, the core network device 200 may be connected to a third-party application function (AF) network element through a network exposure function (NEF) network element. Among them, the NEF network element is responsible for managing externally open network data, for example, providing internal data of the core network to third-party applications. NEF network elements are also used to provide corresponding security guarantees to ensure the security of external applications to the 3rd generation partnership project (3GPP) network, and to provide external application quality of service (QOS) customization capabilities for openness and mobile Functions such as sexual status event subscription and AF request distribution.

在一些实施例中,如图2所示,用户设备(user equipment,UE)可以通过AMF网元接入核心网;无线接入网(radio network access,RNA)设备(例如,基站设备)可以通过AMF网元接入核心网;RNA设备还可以通过UPF网元的接口(例如,核心网业务与传送网(n3interface,N3)接口)与UPF网元进行通信;此外,UPF网元作为移动基础设施(例如,基站设备)和数据网络(data center,DN)之间的互连点,还可以通过网间互联协议网(network tonetwork interface,N6)接口与DN进行通信。In some embodiments, as shown in Figure 2, user equipment (UE) can access the core network through the AMF network element; radio network access (RNA) equipment (for example, base station equipment) can access the core network through the AMF network element. The AMF network element is connected to the core network; the RNA device can also communicate with the UPF network element through the interface of the UPF network element (for example, the core network service and transport network (n3 interface, N3) interface); in addition, the UPF network element serves as a mobile infrastructure The interconnection point between (for example, base station equipment) and the data center (DN) can also communicate with the DN through the network tonetwork interface (N6) interface.

在一些实施例中,核心网设备200可以采用通用服务器,但具体的硬件选择可能会因不同的部署场景和需求而有所不同。示例性的,在中心机房中,可以采用具备高性能、高可靠性和高扩展性的服务器,以满足核心网设备的高吞吐量和低延迟要求。In some embodiments, the core network device 200 may use a general-purpose server, but the specific hardware selection may vary depending on different deployment scenarios and requirements. For example, in the central computer room, servers with high performance, high reliability, and high scalability can be used to meet the high throughput and low latency requirements of core network equipment.

边缘节点300,用于接收所述基站设备发送的数据,并对数据进行处理,得到处理后的所述数据。边缘节点300还用于控制和保护数据和流量,并将数据传输给中继设备400。The edge node 300 is configured to receive data sent by the base station equipment, process the data, and obtain the processed data. The edge node 300 is also used to control and protect data and traffic, and transmit data to the relay device 400.

边缘节点300可以是服务器也或者通信基站。其中,服务器可以是一个单独的服务器,或者,也可以是由多个服务器构成的服务器集群。部分实施方式中,服务器集群还可以是分布式集群。The edge node 300 may be a server or a communication base station. The server may be a single server, or it may be a server cluster composed of multiple servers. In some implementations, the server cluster may also be a distributed cluster.

中继设备400,用于对数据信号进行重新发送或者转发,以此来扩大网络传输距离,从而实现补偿信号衰减、支持远距离通信的作用。The relay device 400 is used to resend or forward the data signal to expand the network transmission distance, thereby compensating for signal attenuation and supporting long-distance communication.

示例性的,中继设备400可以是集线器、网桥、交换机等用于转发数据或信号的设备,在这里不做具体限定。For example, the relay device 400 may be a hub, a bridge, a switch, or other device used for forwarding data or signals, which is not specifically limited here.

在一些实施例中,本申请实施例的专网系统可以利用多接入边缘计算(multi-access edge computing,MEC)边缘算力技术,并结合定位、容灾等增值能力或行业应用,应用到不同的应用场景中,以满足各种场景不同的需求。In some embodiments, the private network system of the embodiments of the present application can utilize multi-access edge computing (MEC) edge computing technology, combined with value-added capabilities or industry applications such as positioning and disaster recovery, and be applied to In different application scenarios, to meet the different needs of various scenarios.

可以理解的是,本申请的专网系统在满足5G专网功能的基础上,也能够根据用户的不同业务需求进行“5G公共网络”的定制化的输出,还将核心网和基站设备部署在相近的位置(比如通信车),然后将核心网的一部分功能下沉到网络边缘服务器上,更好的提升了5G专网的通信能力。本申请的专网属于自建的网络,不存在网络的归属和网络的划分的信任机制。It can be understood that, on the basis of satisfying the 5G private network functions, the private network system of this application can also perform customized output of "5G public network" according to the different business needs of users, and also deploy core network and base station equipment in Similar locations (such as communication vehicles), and then move part of the core network functions to the network edge servers to better improve the communication capabilities of the 5G private network. The private network in this application is a self-built network, and there is no trust mechanism for network ownership and network division.

另外,相比于已有的5G专网的设备和网元的功能可以根据业务需求做定制化的开发,本申请可以通过NEF对基站设备的容积量、数量和耗能情况以及接入网与核心网的灵活接入能力进行开发。In addition, compared with the existing 5G private network equipment and network element functions that can be customized according to business needs, this application can use NEF to analyze the capacity, quantity and energy consumption of base station equipment, as well as the access network and Flexible access capabilities of the core network are developed.

参见图3,为本申请实施例提供的一种专网数据传输架构。如图3所示,该专网数据传输架构可以包括:中继设备、卫星、5G公共网络、防火墙和数据中心;或者,该数据传输架构可以包括:中继设备、卫星、防火墙和数据中心。Refer to Figure 3, which is a private network data transmission architecture provided by an embodiment of the present application. As shown in Figure 3, the private network data transmission architecture may include: relay equipment, satellites, 5G public networks, firewalls, and data centers; or, the data transmission architecture may include: relay equipment, satellites, firewalls, and data centers.

在一些实施例中,当中继设备与数据中心的传输距离近或者网络覆盖范围广时,数据通过5G公共网络传输到数据中心;当中继设备与数据中心的传输距离远或者网络覆盖范围效果不好时,数据通过卫星信号传输到数据中心。In some embodiments, when the transmission distance between the relay device and the data center is close or the network coverage is wide, the data is transmitted to the data center through the 5G public network; when the transmission distance between the relay device and the data center is long or the network coverage is not good, At this time, the data is transmitted to the data center via satellite signals.

在一些实施例中,在数据从中继设备传输到数据中心的过程中,在数据进入数据中心前会经过防火墙进行安全设置。In some embodiments, during the process of data transmission from the relay device to the data center, security settings are performed through the firewall before the data enters the data center.

在一些实施例中,当数据到达数据中心后,可以通过传输网对数据进行远端传输。其中,远端传输通常是在数据中心之间进行数据传输,以实现数据的共享和同步。In some embodiments, after the data reaches the data center, the data can be transmitted remotely through the transmission network. Among them, remote transmission usually involves data transmission between data centers to achieve data sharing and synchronization.

需要说明的,本申请实施例描述的系统架构是为了更加清楚的说明本申请实施例的技术方案,并不构成对于本申请实施例提供的技术方案的限定,本领域普通技术人员可知,随着系统架构的演变,本申请实施例提供的技术方案对于类似的技术问题,同样适用。It should be noted that the system architecture described in the embodiments of the present application is to more clearly explain the technical solutions of the embodiments of the present application, and does not constitute a limitation on the technical solutions provided by the embodiments of the present application. Those of ordinary skill in the art will know that as With the evolution of system architecture, the technical solutions provided by the embodiments of this application are also applicable to similar technical problems.

参见图4,为本申请实施例提供的专网数据处理流程图。如图4所示,本申请实施例提供了一种专网数据处理方法,应用于上述第一方面提供的专网系统;该方法包括:Refer to Figure 4, which is a flow chart of private network data processing provided by an embodiment of the present application. As shown in Figure 4, an embodiment of the present application provides a private network data processing method, which is applied to the private network system provided in the first aspect; the method includes:

S101、基站设备接收终端设备发送的数据,并确定数据所需的算力资源。S101. The base station device receives the data sent by the terminal device and determines the computing resources required for the data.

在一些实施例中,对于算力网络来说,算力资源是指算力网络中的各个网络节点以及各个网络节点的计算能力;对于单个设备来说,算力资源包括该设备的硬件资源、软件资源以及该设备的计算能力。In some embodiments, for a computing power network, computing power resources refer to each network node in the computing power network and the computing power of each network node; for a single device, computing power resources include the hardware resources of the device, software resources and the computing power of the device.

S102、在数据所需的算力资源大于预设阈值的情况下,基站设备将数据发送给边缘节点,以使得边缘节点对数据进行处理,得到处理后的数据。S102. When the computing power resources required for the data are greater than the preset threshold, the base station device sends the data to the edge node, so that the edge node processes the data and obtains the processed data.

S103、在数据所需的算力资源小于或等于预设阈值的情况下,基站设备将数据发送给核心网设备,以使得核心网设备对数据进行处理,得到处理后的数据。S103. When the computing power resources required for the data are less than or equal to the preset threshold, the base station device sends the data to the core network device, so that the core network device processes the data and obtains the processed data.

示例性的,基于图1所示的系统架构,专网数据的处理流程包括以下步骤:Exemplarily, based on the system architecture shown in Figure 1, the private network data processing flow includes the following steps:

步骤a1、基站设备接收各种终端设备产生的数据或信号。Step a1: The base station equipment receives data or signals generated by various terminal equipment.

步骤a2、在数据的算力资源小于或等于预设阈值的情况下,基站设备将数据经过核心网设备发送到中继设备;在数据的算力资源大于预设阈值的情况下,基站设备将数据经过边缘节点发送到中继设备。Step a2. When the computing power resources of the data are less than or equal to the preset threshold, the base station device sends the data to the relay device through the core network device; when the computing power resources of the data are greater than the preset threshold, the base station device will The data is sent to the relay device through the edge node.

步骤a3、核心网设备或边缘节点将接收到的数据并对数据进行处理后转发给中继设备。Step a3: The core network device or edge node processes the received data and forwards it to the relay device.

步骤a4、中继设备接收数据并转发给数据中心。Step a4: The relay device receives the data and forwards it to the data center.

可以理解的是,本申请实施例提供的方法,能够动态地根据数据所需的算力资源来决定将数据发送到边缘节点还是核心网设备,从而更有效地利用网络资源。其次,当数据所需的算力资源大于预设阈值时,数据发送到边缘节点,这样可以减轻核心网设备的负担,优化算力资源的使用,且无需进行公网专网之间的切换,提供了更大的灵活性,能够提高用户使用体验。再者,由于边缘节点具有更强的安全防护能力,可以更好地保护数据的安全性。It can be understood that the method provided by the embodiments of the present application can dynamically decide whether to send the data to the edge node or the core network device based on the computing resources required for the data, thereby utilizing network resources more effectively. Secondly, when the computing resources required for the data are greater than the preset threshold, the data is sent to the edge node, which can reduce the burden on the core network equipment, optimize the use of computing resources, and eliminate the need to switch between public and private networks. Provides greater flexibility and improves user experience. Furthermore, because edge nodes have stronger security protection capabilities, data security can be better protected.

如图5所示,为本申请提供了一种专网接入方法,应用于如图1所示的专网系统;该方法包括:As shown in Figure 5, this application provides a private network access method, which is applied to the private network system shown in Figure 1; the method includes:

S201、基站设备接收终端设备发送的接入认证请求。S201. The base station device receives the access authentication request sent by the terminal device.

S202、基站设备基于接入认证请求进行接入认证。其中,接入认证包括以下至少一项:主认证、二次认证和端到端认证。S202. The base station device performs access authentication based on the access authentication request. Among them, access authentication includes at least one of the following: primary authentication, secondary authentication, and end-to-end authentication.

参见图6,为本申请实施例中的安全认证架构示意图。如图6所示,该认证架构包括:终端设备1、终端设备2、基站设备1、基站设备2、5G专网核心网以及授权和计费(authentication authorization and accounting,AAA)设备。其中,终端设备1与终端设备2通过5G专网核心网设备进行主认证,终端设备1与终端设备2之间通过AAA设备进行二次认证,终端设备1与终端设备2之间进行端到端认证。Refer to Figure 6, which is a schematic diagram of the security authentication architecture in the embodiment of the present application. As shown in Figure 6, the authentication architecture includes: terminal equipment 1, terminal equipment 2, base station equipment 1, base station equipment 2, 5G private network core network, and authorization and accounting (authentication authorization and accounting, AAA) equipment. Among them, terminal equipment 1 and terminal equipment 2 perform primary authentication through 5G private network core network equipment, terminal equipment 1 and terminal equipment 2 perform secondary authentication through AAA equipment, and terminal equipment 1 and terminal equipment 2 perform end-to-end authentication. Certification.

下面,分别对三种接入认证方式进行介绍。Below, the three access authentication methods are introduced respectively.

1、主认证。1. Main certification.

主认证的认证过程快,安全要求高,是终端设备经过5G基站设备接到5G专网的核心网,建立终端设备的PDU的会话流程。The authentication process of main authentication is fast and has high security requirements. It is a session process in which the terminal device connects to the core network of the 5G private network through the 5G base station equipment and establishes the PDU of the terminal device.

如图7所示,为主认证安全架构示意图,其中,该安全架构包括:终端设备、接入网、核心网。本申请对接入网、核心网的控制面和用户面的数据进行了机密性的保护。As shown in Figure 7, it is a schematic diagram of the main authentication security architecture, in which the security architecture includes: terminal equipment, access network, and core network. This application protects the confidentiality of data on the control plane and user plane of the access network, core network.

可以理解的是,在接入网的安全架构中,对各种应用场景下的终端设备进行统一的接入和入网认证可以确保终端设备能够安全地连接到网络,并获得所需的网络服务。其中,在控制面,通过接入网与安全锚点和认证服务器进行统一的入网认证,可以确保只有经过授权的终端设备能够访问网络,并获得所需的网络服务。再者,在控制面和用户面,通过生成相关的密钥对终端设备和核心网控制面进行统一的数据和信令的保护,能够确保数据和信令的机密性和完整性,提高通信的可靠性。It can be understood that in the security architecture of the access network, unified access and network access authentication for terminal devices in various application scenarios can ensure that terminal devices can safely connect to the network and obtain required network services. Among them, on the control plane, unified network access authentication is performed through the access network, security anchor point and authentication server to ensure that only authorized terminal devices can access the network and obtain required network services. Furthermore, on the control plane and user plane, unified data and signaling protection is performed on the terminal equipment and core network control plane by generating relevant keys, which can ensure the confidentiality and integrity of data and signaling and improve communication efficiency. reliability.

在一些实施例中,主认证的过程包括:首先在终端设备接入到接入网的过程中,通过基站设备为终端设备提供入网认证,然后通过AMF网元、安全锚定功能(security anchorfunction,SEAF)和AUSF网元的配合,完成接入网到核心网的安全认证过程。In some embodiments, the main authentication process includes: first, when the terminal device accesses the access network, the base station device provides network access authentication for the terminal device, and then uses the AMF network element and the security anchor function (security anchor function, SEAF) and AUSF network elements cooperate to complete the security authentication process from the access network to the core network.

在一些实施例中,如图8所示,在UE接入的过程中,会出现两种情况:3GPP接入与非3GPP接入形式。接入后在通过AMF接入到核心网中。在接入的过程中采用了前向安全接入认证机制,能对数据进行很好的保密。In some embodiments, as shown in Figure 8, during the UE access process, two situations may occur: 3GPP access and non-3GPP access. After access, it is connected to the core network through AMF. During the access process, a forward secure access authentication mechanism is adopted, which can keep the data confidential.

示例性的,主认证过程可以实现为以下步骤:As an example, the main authentication process can be implemented as the following steps:

步骤b1、终端设备向5G基站设备发送接入请求信息。Step b1: The terminal device sends access request information to the 5G base station device.

步骤b2、5G基站设备接收接入请求信息后,完成AMF选择,同时生成空口信令信息和空口信令保护信息,并将空口信令和空口信令保护信息发送给UDM。Step b2: After receiving the access request information, the 5G base station equipment completes the AMF selection, generates air interface signaling information and air interface signaling protection information, and sends the air interface signaling and air interface signaling protection information to the UDM.

其中,空口信令信息用于携带终端设备和基站设备的相关数据;空口信令保护信息用于空口信令信息的网元保护。Among them, the air interface signaling information is used to carry relevant data of the terminal equipment and the base station equipment; the air interface signaling protection information is used to protect the network element of the air interface signaling information.

步骤b3、UDM网元接收空口信令信息后,发送给AUSF网元完成信息存储,然后再发送给AMF网元。Step b3: After receiving the air interface signaling information, the UDM network element sends it to the AUSF network element to complete information storage, and then sends it to the AMF network element.

步骤b4、AMF接收UDM网元发送的空口信令信息产生响应信号,并将响应信号和空口信令信息包括的随机数生成器(random number generator,RAND)密钥标识符(next-generation key service identifier,ngKSI)等参数信息发送给终端设备,以使得终端设备发起终端设备的鉴权行为。Step b4: The AMF receives the air interface signaling information sent by the UDM network element to generate a response signal, and combines the response signal and the random number generator (RAND) key identifier (next-generation key service) included in the air interface signaling information. identifier, ngKSI) and other parameter information are sent to the terminal device, so that the terminal device initiates the authentication behavior of the terminal device.

步骤b5、终端设备产生鉴权结果(authentication and key agreement,AND)并向用户识别模块(universal subscriber identity module,USIM)发送AND、ngKSI等参数信息。Step b5: The terminal device generates an authentication result (authentication and key agreement, AND) and sends parameter information such as AND and ngKSI to the user identification module (universal subscriber identity module, USIM).

步骤b6、USIM响应终端发送的参数信息,并将响应信息发送给5G基站设备。Step b6: USIM responds to the parameter information sent by the terminal and sends the response information to the 5G base station equipment.

步骤b7、5G基站设备接收响应信息并发送给AUSF网元进行鉴权操作。Step b7: The 5G base station equipment receives the response information and sends it to the AUSF network element for authentication operation.

2、二次认证。2. Secondary certification.

二次认证的认证级别高于主认证,二次认证是在完成主认证的前提下,再经过第三方的AAA认证体系进行第二次的认证过程。二次认证是以网络切片的认证方式来保证数据的安全性。The certification level of secondary certification is higher than that of primary certification. Secondary certification is a second certification process conducted through a third-party AAA certification system on the premise of completing primary certification. Secondary authentication uses network slicing authentication to ensure data security.

在一些实施例中,二次认证需要和用户通过自定义的可扩展认证协议(extensible authentication protocol,EAP)过程建立鉴权认证。如图9所示,为二次认证的架构示意图,该架构包括:UE,RNA,核心网网元以及DN。In some embodiments, secondary authentication requires establishing authentication with the user through a customized extensible authentication protocol (EAP) process. As shown in Figure 9, it is a schematic diagram of the architecture of secondary authentication. The architecture includes: UE, RNA, core network elements and DN.

示例性的,基于图9所示架构,本申请实施例中二次认证流程可以实现为以下步骤:Exemplarily, based on the architecture shown in Figure 9, the secondary authentication process in the embodiment of this application can be implemented as the following steps:

步骤c1、终端设备向可扩展认证协议服务器(extensible authenticationprotocol server,EAP Server)发送请求信息,以使得EAP Server开启应答系统,进行随机数生成,并将加密后的共享密钥发送给终端设备。Step c1: The terminal device sends request information to the extensible authentication protocol server (EAP Server), so that the EAP Server starts the response system, generates random numbers, and sends the encrypted shared key to the terminal device.

步骤c2、在终端设备验证密钥完整的情况下,终端设备生成另外一组随机数作为密钥,并发送给EAP Server。Step c2: When the terminal device verifies that the key is complete, the terminal device generates another set of random numbers as the key and sends it to the EAP Server.

步骤c3、在EAP Server验证密钥没有被改动的情况下,终端设备接收EAP Server发送的反馈信息,其中,反馈信息用于指示密钥是否被改动。Step c3: When the EAP Server verifies that the key has not been changed, the terminal device receives feedback information sent by the EAP Server, where the feedback information is used to indicate whether the key has been changed.

在一些实施例中,在主认证和二次认证的过程中,终端设备会以5G鉴权与密钥协商(5G authentication and key agreement,5G-AKA)的形式接入到5G网络,在接入后会通过分布式拒绝服务(distributed denial of service,DDos)或拒绝服务(denial ofservice,DoS)来防止外部攻击。In some embodiments, during the process of primary authentication and secondary authentication, the terminal device will access the 5G network in the form of 5G authentication and key agreement (5G-AKA). Later, external attacks will be prevented through distributed denial of service (DDos) or denial of service (denial of service, DoS).

需要说明的是,主认证和二次认证为终端设备与核心网的接入认证。在接入认证过程中,通过控制面的完整性和安全防护功能,确保数据的完整性和机密性。It should be noted that primary authentication and secondary authentication are access authentication between terminal equipment and the core network. During the access authentication process, data integrity and confidentiality are ensured through the integrity and security protection functions of the control plane.

除此外,本申请提供的接入认证还可以包括端到端认证。其中,端到端认证涉及加密技术和身份认证技术,该认证能确保端到端建立安全的通信服务。In addition, the access authentication provided by this application can also include end-to-end authentication. Among them, end-to-end authentication involves encryption technology and identity authentication technology, which can ensure the establishment of secure communication services end-to-end.

3、端到端认证。3. End-to-end authentication.

端到端认证是通过基站设备来完成的认证过程,端到端认证可以不通过核心网来完成,此时可以将核心网下沉到接入网中,将功能进行简化。在基站设备不能覆盖的情况下终端设备通过广播的形式进行信息的交互,进而建立端到端的通信。End-to-end authentication is an authentication process completed through base station equipment. End-to-end authentication does not need to be completed through the core network. In this case, the core network can be moved down to the access network to simplify the functions. When the base station equipment cannot cover it, the terminal equipment exchanges information in the form of broadcast, thereby establishing end-to-end communication.

参见图10,为端到端认证的场景示意图。如图10所示,该场景包括:终端设备1、5G核心网、终端设备2。其中,5G核心网可以部署在通信车、基站设备或者一些加强设备上。可以理解的是,该通信过程可以降低核心网的压力,提升通信容量。See Figure 10, which is a schematic diagram of the end-to-end authentication scenario. As shown in Figure 10, this scenario includes: terminal equipment 1, 5G core network, and terminal equipment 2. Among them, the 5G core network can be deployed on communication vehicles, base station equipment or some enhanced equipment. It is understandable that this communication process can reduce the pressure on the core network and increase communication capacity.

在一些实施例中,在终端设备到终端设备的通信适用在处于同一基站设备的情况下,终端设备的认证通过基站设备进行。具体的,终端设备先通过认证获得密钥的认证,然后通过基站设备进行终端设备之间的信息交换。在这个过程中,同时完成身份和密钥认证。In some embodiments, when communication from terminal device to terminal device is applicable in the same base station device, the authentication of the terminal device is performed through the base station device. Specifically, the terminal equipment first obtains key authentication through authentication, and then exchanges information between the terminal equipment through the base station equipment. During this process, identity and key authentication are completed simultaneously.

为了便于理解,下面结合应用场景,以示例的形式对本申请实施例提供的端到端认证进行说明。For ease of understanding, the end-to-end authentication provided by the embodiments of the present application is described below in conjunction with application scenarios in the form of examples.

参见图11,为本申请实施例端到端认证场景示意图。图11所示场景包括终端设备1、终端设备2和基站设备三个设备,其中,终端设备1和终端设备2都在基站设备的覆盖范围内。Refer to Figure 11, which is a schematic diagram of the end-to-end authentication scenario according to this embodiment of the present application. The scenario shown in Figure 11 includes three devices: terminal equipment 1, terminal equipment 2, and base station equipment. Among them, terminal equipment 1 and terminal equipment 2 are both within the coverage of the base station equipment.

示例性的,在如图11所示的场景中,端到端认证的方法包括:For example, in the scenario shown in Figure 11, the end-to-end authentication method includes:

步骤d1、终端设备1和终端设备2向基站设备发送认证请求。Step d1: Terminal equipment 1 and terminal equipment 2 send authentication requests to the base station equipment.

步骤d2、基站设备将该认证请求转发到认证服务器进行身份验证。Step d2: The base station device forwards the authentication request to the authentication server for identity verification.

步骤d3、身份验证成功后,终端设备1和终端设备2通过基站设备进行信息交换。Step d3: After the identity verification is successful, terminal equipment 1 and terminal equipment 2 exchange information through the base station equipment.

在一些实施例中,在终端设备到终端设备的通信适用在处于不同基站设备的情况下,终端设备与终端设备的认证是通过基站设备完成的。具体的,终端设备与终端设备通过两者之间的基站设备进行信息交换,终端设备之间通过5G-AKA来进行认证信息的交换和密钥的获取。In some embodiments, when communication from terminal equipment to terminal equipment is applicable to different base station equipment, authentication between terminal equipment and terminal equipment is completed through the base station equipment. Specifically, terminal equipment and terminal equipment exchange information through the base station equipment between them, and terminal equipment exchanges authentication information and obtains keys through 5G-AKA.

为了便于理解,下面结合应用场景,以示例的形式对本申请实施例提供的端到端认证进行说明。For ease of understanding, the end-to-end authentication provided by the embodiments of the present application is described below in conjunction with application scenarios in the form of examples.

参见图12,为本申请实施例端到端认证场景示意图。图12所示场景包括终端设备1、终端设备2、基站设备1和基站设备2四个设备,其中,终端设备1在基站设备1的覆盖范围内,终端设备2在基站设备2的覆盖范围内。Refer to Figure 12, which is a schematic diagram of the end-to-end authentication scenario according to this embodiment of the present application. The scene shown in Figure 12 includes four devices: terminal equipment 1, terminal equipment 2, base station equipment 1 and base station equipment 2. Among them, terminal equipment 1 is within the coverage area of base station equipment 1, and terminal equipment 2 is within the coverage area of base station equipment 2. .

示例性的,在如图12所示的场景中,端到端认证的方法包括:For example, in the scenario shown in Figure 12, the end-to-end authentication method includes:

步骤e1、终端设备1向基站设备1发送认证请求,终端设备2向基站设备2发送认证请求。Step e1: The terminal device 1 sends an authentication request to the base station device 1, and the terminal device 2 sends an authentication request to the base station device 2.

步骤e2、基站设备1和基站设备2将认证请求转发到相关的鉴权服务器进行身份验证。Step e2: Base station device 1 and base station device 2 forward the authentication request to the relevant authentication server for identity verification.

步骤e3、身份验证成功后,鉴权服务器会与终端设备1和终端设备2通过5G-AKA协议进行交互,协商生成用于信息交互的密钥。Step e3. After the identity verification is successful, the authentication server will interact with terminal device 1 and terminal device 2 through the 5G-AKA protocol, and negotiate to generate a key for information exchange.

步骤e4、终端设备1和终端设备2接收到密钥后,会对其进行验证。Step e4: After receiving the key, terminal device 1 and terminal device 2 will verify it.

步骤e5、在密钥验证成功后,终端设备1与终端设备2通过基站设备1与基站设备2进行信息交换。Step e5: After the key verification is successful, the terminal device 1 and the terminal device 2 exchange information through the base station device 1 and the base station device 2.

在一些实施例中,在两个终端设备不在同一个基站的覆盖范围内,且其中一个终端设备没有被任何一个基站覆盖到的情况下,终端设备的密钥验证过程无需基站设备进行验证。具体的,终端设备通过基站设备连接到核心网完成身份和密钥验证,并且获得密钥的具体信息。In some embodiments, when two terminal devices are not within the coverage of the same base station, and one terminal device is not covered by any base station, the key verification process of the terminal device does not require verification by the base station device. Specifically, the terminal device connects to the core network through the base station device to complete identity and key verification, and obtains specific information about the key.

为了便于理解,下面结合应用场景,以示例的形式对本申请实施例提供的端到端认证进行说明。For ease of understanding, the end-to-end authentication provided by the embodiments of the present application is described below in conjunction with application scenarios in the form of examples.

参见图13,为本申请实施例端到端认证场景示意图。图13所示场景包括终端设备1、终端设备2和基站设备三个设备,其中,终端设备1在基站设备的覆盖范围内,终端设备2不在基站设备的覆盖范围内。Refer to Figure 13, which is a schematic diagram of the end-to-end authentication scenario according to this embodiment of the present application. The scenario shown in Figure 13 includes three devices: terminal equipment 1, terminal equipment 2, and base station equipment. Among them, terminal equipment 1 is within the coverage of the base station equipment, and terminal equipment 2 is not within the coverage of the base station equipment.

示例性的,在如图13所示的场景中,端到端认证的方法包括:For example, in the scenario shown in Figure 13, the end-to-end authentication method includes:

步骤f1、终端设备1和终端设备2向核心网发送认证请求。Step f1: Terminal device 1 and terminal device 2 send authentication requests to the core network.

步骤f2、核心网根据一定的认证机制对终端设备的身份进行验证。Step f2: The core network verifies the identity of the terminal device according to a certain authentication mechanism.

步骤f3、身份验证成功后,核心网会与终端设备1和终端设备2通过5G-AKA协议或其他相关协议进行交互,协商生成用于信息交互的密钥。Step f3. After the identity authentication is successful, the core network will interact with terminal device 1 and terminal device 2 through the 5G-AKA protocol or other related protocols, and negotiate to generate a key for information exchange.

步骤f4、终端设备1和终端设备2接收到密钥后,会对其进行验证。In step f4, after receiving the key, terminal device 1 and terminal device 2 will verify it.

步骤f5、密钥验证成功后,终端设备1和终端设备2就可以使用该密钥进行安全的信息交换。In step f5, after the key verification is successful, terminal device 1 and terminal device 2 can use the key to exchange secure information.

可以理解的是,本申请通过基站设备接收终端设备发送的接入认证请求,并基于接入认证请求进行接入认证,可以确保只有经过身份验证的用户才能使用网络服务,从而提高网络的安全性。其次,通过实施接入认证,可以防止未经授权的终端设备接入网络,从而减少网络安全风险。本申请实施例也解决了由于网络的开放性而导致的一些安全问题,例如,终端设备通过无线网接入到网络时容易受到网络攻击导致信息泄露的安全,相关技术的5G网络在专网的接入过程中,从终端设备到接入网,再到核心网的流程中通信链路中的信息存在隐患。It can be understood that this application receives the access authentication request sent by the terminal device through the base station device, and performs access authentication based on the access authentication request, which can ensure that only authenticated users can use network services, thereby improving network security. . Secondly, by implementing access authentication, unauthorized terminal devices can be prevented from accessing the network, thereby reducing network security risks. The embodiments of the present application also solve some security problems caused by the openness of the network. For example, when terminal equipment is connected to the network through a wireless network, it is vulnerable to network attacks, leading to information leakage. The 5G network of related technologies is in the private network. During the access process, there are hidden dangers in the information in the communication link from the terminal device to the access network and then to the core network.

可以看出,上述主要从方法的角度对本申请实施例提供的方案进行了介绍。为了实现上述功能,本申请实施例提供了执行各个功能相应的硬件结构和/或软件模块。本领域技术人员应该很容易意识到,结合本文中所公开的实施例描述的各示例的模块及算法步骤,本申请实施例能够以硬件或硬件和计算机软件的结合形式来实现。某个功能究竟以硬件还是计算机软件驱动硬件的方式来执行,取决于技术方案的特定应用和设计约束条件。专业技术人员可以对每个特定的应用来使用不同方法来实现所描述的功能,但是这种实现不应认为超出本发明的范围。It can be seen that the above mainly introduces the solutions provided by the embodiments of the present application from the perspective of methods. In order to realize the above functions, embodiments of the present application provide corresponding hardware structures and/or software modules to perform each function. Those skilled in the art should easily realize that, in conjunction with the modules and algorithm steps of each example described in the embodiments disclosed herein, the embodiments of the present application can be implemented in the form of hardware or a combination of hardware and computer software. Whether a function is performed by hardware or by computer software driving the hardware depends on the specific application and design constraints of the technical solution. Skilled artisans may implement the described functionality using different methods for each specific application, but such implementations should not be considered to be beyond the scope of the present invention.

本申请实施例可以根据上述方法示例对网络节点进行功能模块的划分,例如,可以对应各个功能划分各个功能模块,也可以将两个或两个以上的功能集成在一个处理模块中。上述集成的模块既可以采用硬件的形式实现,也可以采用软件功能模块的形式实现。可选的,本申请实施例中对模块的划分是示意性的,仅仅为一种逻辑功能划分,实际实现时可以有另外的划分方式。Embodiments of the present application can divide network nodes into functional modules according to the above method examples. For example, functional modules can be divided into corresponding functional modules, or two or more functions can be integrated into one processing module. The above integrated modules can be implemented in the form of hardware or software function modules. Optionally, the division of modules in the embodiment of this application is schematic and is only a logical function division. There may be other division methods in actual implementation.

如图14所示,为本申请实施例提供的一种专网数据处理装置的结构示意图。该专网数据处理装置1400可以应用于上述专网数据处理方法中。该专网数据处理装置1400包括:确定模块1401,用于基站设备接收终端设备发送的数据,并确定数据所需的算力资源;发送模块1402,用于在数据所需的算力资源大于预设阈值的情况下,将数据发送给边缘节点,以使得边缘节点对数据进行处理,基站设备将数据发送给边缘节点,以使得边缘节点对数据进行处理,得到处理后的数据;发送模块1402,还用于在数据所需的算力资源小于或等于预设阈值的情况下,基站设备将数据发送给核心网设备,以使得核心网设备对数据进行处理,得到处理后的数据。As shown in Figure 14, it is a schematic structural diagram of a private network data processing device provided by an embodiment of the present application. The private network data processing device 1400 can be applied to the above private network data processing method. The private network data processing device 1400 includes: a determination module 1401, used for the base station equipment to receive data sent by the terminal equipment, and to determine the computing power resources required for the data; a sending module 1402, used for when the computing power resources required for the data are greater than the predetermined When a threshold is set, the data is sent to the edge node so that the edge node processes the data. The base station device sends the data to the edge node so that the edge node processes the data and obtains the processed data; the sending module 1402, It is also used when the computing power resources required for the data are less than or equal to the preset threshold, the base station equipment sends the data to the core network equipment, so that the core network equipment processes the data and obtains the processed data.

如图15所示,为本申请实施例提供的一种专网接入装置的结构示意图。该专网接入装置1500可以应用于上述专网接入方法中。该专网接入装置1500包括:认证模块1501,用于基站设备接收终端设备发送的接入认证请求,并基于接入认证请求进行接入认证;其中,接入认证包括以下至少一项:主认证、二次认证和端到端认证。As shown in Figure 15, it is a schematic structural diagram of a private network access device provided by an embodiment of the present application. The private network access device 1500 can be applied in the above private network access method. The private network access device 1500 includes: an authentication module 1501, used for the base station equipment to receive the access authentication request sent by the terminal equipment, and to perform access authentication based on the access authentication request; wherein the access authentication includes at least one of the following: Authentication, secondary authentication and end-to-end authentication.

在采用硬件的形式实现上述集成的模块的功能的情况下,本发明实施例提供了上述实施例中所涉及的专网数据处理装置和专网接入装置的另一种可能的结构示意图。如图16所示,该专网数据处理装置和专网接入装置的另一种可能结构包括:处理器1602,通信接口1603,总线1604。可选的,该专网装置还可以包括存储器1601。When the functions of the above integrated modules are implemented in the form of hardware, the embodiment of the present invention provides another possible structural schematic diagram of the private network data processing device and the private network access device involved in the above embodiment. As shown in Figure 16, another possible structure of the private network data processing device and the private network access device includes: a processor 1602, a communication interface 1603, and a bus 1604. Optionally, the private network device may also include a memory 1601.

处理器1602,可以是实现或执行结合本申请公开内容所描述的各种示例性的逻辑方框,模块和电路。该处理器1602可以是中央处理器,通用处理器,数字信号处理器,专用集成电路,现场可编程门阵列或者其他可编程逻辑器件、晶体管逻辑器件、硬件部件或者其任意组合。其可以实现或执行结合本申请公开内容所描述的各种示例性的逻辑方框,模块和电路。所述处理器1602也可以是实现计算功能的组合,例如包含一个或多个微处理器组合,DSP和微处理器的组合等。Processor 1602 may implement or execute various exemplary logical blocks, modules and circuits described in connection with the disclosure of this application. The processor 1602 may be a central processing unit, a general-purpose processor, a digital signal processor, an application-specific integrated circuit, a field-programmable gate array or other programmable logic devices, transistor logic devices, hardware components, or any combination thereof. It may implement or execute the various illustrative logical blocks, modules, and circuits described in connection with this disclosure. The processor 1602 may also be a combination that implements computing functions, such as a combination of one or more microprocessors, a combination of a DSP and a microprocessor, etc.

通信接口1603,用于与其他设备通过通信网络连接。该通信网络可以是以太网,无线接入网,无线局域网(wireless local area networks,WLAN)等。Communication interface 1603, used to connect with other devices through a communication network. The communication network may be an Ethernet, a wireless access network, a wireless local area network (WLAN), etc.

存储器1601,可以是只读存储器(read-only memory,ROM)或可存储静态信息和指令的其他类型的静态存储设备,随机存取存储器(random access memory,RAM)或者可存储信息和指令的其他类型的动态存储设备,也可以是电可擦可编程只读存储器(electrically erasable programmable read-only memory,EEPROM)、磁盘存储介质或者其他磁存储设备、或者能够用于携带或存储具有指令或数据结构形式的期望的程序代码并能够由计算机存取的任何其他介质,但不限于此。Memory 1601 may be a read-only memory (ROM) or other types of static storage devices that can store static information and instructions, a random access memory (random access memory, RAM) or other types of static storage devices that can store information and instructions. type of dynamic storage device, which can also be electrically erasable programmable read-only memory (EEPROM), disk storage media or other magnetic storage devices, or can be used to carry or store instructions or data structures Without limitation, any other medium in the form of the desired program code and capable of being accessed by a computer.

作为一种可能的实现方式,存储器1601可以独立于处理器1602存在,存储器1601可以通过总线1604与处理器1602相连接,用于存储指令或者程序代码。处理器1602调用并执行存储器1601中存储的指令或程序代码时,能够实现本发明实施例提供的专网数据处理方法和专网接入方法。As a possible implementation, the memory 1601 may exist independently of the processor 1602. The memory 1601 may be connected to the processor 1602 through the bus 1604 for storing instructions or program codes. When the processor 1602 calls and executes the instructions or program codes stored in the memory 1601, it can implement the private network data processing method and private network access method provided by the embodiment of the present invention.

另一种可能的实现方式中,存储器1601也可以和处理器1602集成在一起。In another possible implementation, the memory 1601 can also be integrated with the processor 1602.

总线1604,可以是扩展工业标准结构(extended industry standardarchitecture,EISA)总线等。总线1604可以分为地址总线、数据总线、控制总线等。为便于表示,图16中仅用一条粗线表示,但并不表示仅有一根总线或一种类型的总线。The bus 1604 may be an extended industry standard architecture (EISA) bus or the like. The bus 1604 can be divided into an address bus, a data bus, a control bus, etc. For ease of presentation, only one thick line is used in Figure 16, but it does not mean that there is only one bus or one type of bus.

通过以上的实施方式的描述,所属领域的技术人员可以清楚地了解到,为描述的方便和简洁,仅以上述各功能模块的划分进行举例说明,实际应用中,可以根据需要而将上述功能分配由不同的功能模块完成,即将专网装置的内部结构划分成不同的功能模块,以完成以上描述的全部或者部分功能。Through the above description of the embodiments, those skilled in the art can clearly understand that for the convenience and simplicity of description, only the division of the above functional modules is used as an example. In actual applications, the above functions can be allocated as needed. It is completed by different functional modules, that is, the internal structure of the private network device is divided into different functional modules to complete all or part of the functions described above.

本申请实施例还提供了一种计算机可读存储介质。上述方法实施例中的全部或者部分流程可以由计算机指令来指示相关的硬件完成,该程序可存储于上述计算机可读存储介质中,该程序在执行时,可包括如上述各方法实施例的流程。计算机可读存储介质可以是前述任一实施例的或内存。上述计算机可读存储介质也可以是上述专网装置的外部存储设备,例如上述专网装置上配备的插接式硬盘,智能存储卡(smart media card,SMC),安全数字(secure digital,SD)卡,闪存卡(flash card)等。进一步地,上述计算机可读存储介质还可以既包括上述专网装置的内部存储单元也包括外部存储设备。上述计算机可读存储介质用于存储上述计算机程序以及上述专网装置所需的其他程序和数据。上述计算机可读存储介质还可以用于暂时地存储已经输出或者将要输出的数据。An embodiment of the present application also provides a computer-readable storage medium. All or part of the processes in the above method embodiments can be completed by computer instructions to instruct relevant hardware. The program can be stored in the above computer-readable storage medium. When executed, the program can include the processes of the above method embodiments. . The computer-readable storage medium may be the memory of any of the aforementioned embodiments. The computer-readable storage medium may also be an external storage device of the private network device, such as a plug-in hard drive, a smart media card (SMC), or a secure digital (SD) equipped on the private network device. card, flash card, etc. Furthermore, the computer-readable storage medium may also include both an internal storage unit of the private network device and an external storage device. The above computer-readable storage medium is used to store the above computer program and other programs and data required by the above private network device. The above-mentioned computer-readable storage media can also be used to temporarily store data that has been output or is to be output.

本申请实施例还提供一种计算机程序产品,该计算机产品包含计算机程序,当该计算机程序产品在计算机上运行时,使得该计算机执行上述实施例中所提供的任一项专网数据处理方法和专网接入方法。Embodiments of the present application also provide a computer program product. The computer product includes a computer program. When the computer program product is run on a computer, it causes the computer to execute any one of the private network data processing methods and methods provided in the above embodiments. Private network access method.

以上所述,仅为本申请的具体实施方式,但本申请的保护范围并不局限于此,任何在本申请揭露的技术范围内的变化或替换,都应涵盖在本申请的保护范围之内。因此,本申请的保护范围应该以权利要求的保护范围为准。The above are only specific embodiments of the present application, but the protection scope of the present application is not limited thereto. Any changes or substitutions within the technical scope disclosed in the present application shall be covered by the protection scope of the present application. . Therefore, the protection scope of this application should be subject to the protection scope of the claims.

Claims (10)

1.一种专网系统,其特征在于,包括:基站设备、核心网设备、边缘节点和中继设备;所述基站设备与所述边缘节点之间通信连接;所述边缘节点与所述中继设备之间通信连接;所述核心网设备与所述基站设备之间通信连接;所述核心网设备与所述中继设备之间通信连接;1. A private network system, characterized in that it includes: base station equipment, core network equipment, edge nodes and relay equipment; communication connection between the base station equipment and the edge node; the edge node and the central Communication connection between relay devices; communication connection between the core network device and the base station device; communication connection between the core network device and the relay device; 所述基站设备,用于接收终端设备发送的数据,并确定所述数据所需的算力资源;在所述数据所需的算力资源大于预设阈值的情况下,将所述数据发送给所述边缘节点;在所述数据所需的算力资源小于或等于预设阈值的情况下,将所述数据发送给所述核心网设备;The base station equipment is used to receive data sent by the terminal equipment and determine the computing power resources required by the data; when the computing power resources required by the data are greater than a preset threshold, send the data to The edge node; when the computing power resources required for the data are less than or equal to a preset threshold, send the data to the core network device; 所述边缘节点,用于接收所述基站设备发送的数据,并对所述数据进行处理,得到处理后的所述数据;The edge node is used to receive data sent by the base station equipment, process the data, and obtain the processed data; 所述核心网设备,用于接收所述基站设备发送的数据,并对所述数据进行处理,得到处理后的所述数据;The core network equipment is used to receive data sent by the base station equipment, process the data, and obtain the processed data; 所述中继设备,用于将处理后的所述数据,传输到数据中心。The relay device is used to transmit the processed data to the data center. 2.根据权利要求1所述的专网系统,其特征在于,所述中继设备,还用于对所述数据承载的信号进行放大。2. The private network system according to claim 1, wherein the relay device is also used to amplify the signal carried by the data. 3.根据权利要求1所述的专网系统,其特征在于,所述中继设备,具体用于通过第五代移动通信技术5G公网将处理后的所述数据传输到所述数据中心。3. The private network system according to claim 1, characterized in that the relay device is specifically used to transmit the processed data to the data center through the fifth generation mobile communication technology 5G public network. 4.根据权利要求1所述的专网系统,其特征在于,所述中继设备,具体用于通过卫星将处理后的所述数据传输到所述数据中心。4. The private network system according to claim 1, wherein the relay device is specifically configured to transmit the processed data to the data center through satellite. 5.一种专网数据处理方法,其特征在于,应用于权利要求1-4任一项所述的专网系统;所述方法包括:5. A private network data processing method, characterized in that it is applied to the private network system according to any one of claims 1 to 4; the method includes: 基站设备接收终端设备发送的数据,并确定所述数据所需的算力资源;The base station equipment receives the data sent by the terminal equipment and determines the computing resources required for the data; 在所述数据所需的算力资源大于预设阈值的情况下,所述基站设备将所述数据发送给边缘节点,以使得所述边缘节点对所述数据进行处理,得到处理后的所述数据;When the computing resources required for the data are greater than the preset threshold, the base station device sends the data to the edge node, so that the edge node processes the data and obtains the processed data; 在所述数据所需的算力资源小于或等于预设阈值的情况下,所述基站设备将所述数据发送给核心网设备,以使得所述核心网设备对所述数据进行处理,得到处理后的所述数据。When the computing resources required for the data are less than or equal to the preset threshold, the base station device sends the data to the core network device, so that the core network device processes the data and obtains the processing the following data. 6.一种专网接入方法,其特征在于,应用于权利要求1-4任一项所述的专网系统;所述方法包括:6. A private network access method, characterized in that it is applied to the private network system according to any one of claims 1 to 4; the method includes: 基站设备接收终端设备发送的接入认证请求,并基于所述接入认证请求进行接入认证;其中,所述接入认证包括以下至少一项:主认证、二次认证和端到端认证。The base station device receives the access authentication request sent by the terminal device, and performs access authentication based on the access authentication request; wherein the access authentication includes at least one of the following: primary authentication, secondary authentication, and end-to-end authentication. 7.一种专网数据处理装置,其特征在于,应用于基站设备;所述装置包括:7. A private network data processing device, characterized in that it is applied to base station equipment; the device includes: 确定模块,用于接收终端设备发送的数据,并确定所述数据所需的算力资源;Determining module, used to receive data sent by the terminal device and determine the computing resources required for the data; 发送模块,用于在所述数据所需的算力资源大于预设阈值的情况下,将所述数据发送给边缘节点,以使得所述边缘节点对所述数据进行处理,得到处理后的所述数据;A sending module, configured to send the data to an edge node when the computing resources required for the data are greater than a preset threshold, so that the edge node processes the data and obtains the processed data. Describe data; 所述发送模块,还用于在所述数据所需的算力资源小于或等于预设阈值的情况下,将所述数据发送给核心网设备,以使得所述核心网设备对所述数据进行处理,得到处理后的所述数据。The sending module is also configured to send the data to the core network device when the computing resources required for the data are less than or equal to a preset threshold, so that the core network device performs processing on the data. Process to obtain the processed data. 8.一种专网接入装置,其特征在于,应用于基站设备;所述装置包括:8. A private network access device, characterized in that it is applied to base station equipment; the device includes: 认证模块,用于接收终端设备发送的接入认证请求,并基于所述接入认证请求进行接入认证;其中,所述接入认证包括以下至少一项:主认证、二次认证和端到端认证。An authentication module, configured to receive an access authentication request sent by a terminal device, and perform access authentication based on the access authentication request; wherein the access authentication includes at least one of the following: primary authentication, secondary authentication, and end-to-end authentication. end authentication. 9.一种电子设备,其特征在于,包括处理器和存储器,所述处理器与所述存储器耦合;所述存储器用于存储计算机指令,所述计算机指令由所述处理器加载并执行以使计算机设备实现如权利要求5和权利要求6中任一项所述的方法。9. An electronic device, characterized in that it includes a processor and a memory, the processor is coupled to the memory; the memory is used to store computer instructions, and the computer instructions are loaded and executed by the processor to cause The computer device implements the method as claimed in any one of claims 5 and 6. 10.一种计算机可读存储介质,其特征在于,所述计算机可读存储介质包括计算机执行指令,当所述计算机执行指令在计算机上运行时,使得所述计算机执行权利要求5和权利要求6中任一项所述的方法。10. A computer-readable storage medium, characterized in that the computer-readable storage medium includes computer-executable instructions, which when the computer-executable instructions are run on a computer, cause the computer to execute claims 5 and 6 any one of the methods.
CN202311482136.6A 2023-11-08 2023-11-08 Private network system, private network data processing method, private network access method and device Pending CN117354868A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202311482136.6A CN117354868A (en) 2023-11-08 2023-11-08 Private network system, private network data processing method, private network access method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202311482136.6A CN117354868A (en) 2023-11-08 2023-11-08 Private network system, private network data processing method, private network access method and device

Publications (1)

Publication Number Publication Date
CN117354868A true CN117354868A (en) 2024-01-05

Family

ID=89364932

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202311482136.6A Pending CN117354868A (en) 2023-11-08 2023-11-08 Private network system, private network data processing method, private network access method and device

Country Status (1)

Country Link
CN (1) CN117354868A (en)

Similar Documents

Publication Publication Date Title
US11895157B2 (en) Network security management method, and apparatus
CN104168669B (en) The method and system of cell access is managed for using cellular infrastructure
RU2446606C1 (en) Method of access with authentication and access system with authentication in wireless multi-hop network
WO2018161796A1 (en) Connection processing method and apparatus in multi-access scenario
EP2234438B1 (en) Wireless personal area network accessing method
CN113748697B (en) Method and system for providing non-access stratum (NAS) message protection
US8661510B2 (en) Topology based fast secured access
WO2021063298A1 (en) Method for implementing external authentication, communication device and communication system
CN100581125C (en) Access method suitable for WPAN
CN110351722B (en) Information sending method, key generation method and device
WO2018170703A1 (en) Connection establishment method and device
US20240340354A1 (en) Method and publisher-subscriber network
CN114640988A (en) Information processing method and device based on implicit indication encryption
WO2022155915A1 (en) Network intercommunication method and apparatus
CN115412911A (en) An authentication method, communication device and system
CN117354868A (en) Private network system, private network data processing method, private network access method and device
CN119586184A (en) Method and apparatus for authenticating attacks of fake base stations in wireless communication systems
WO2022217571A1 (en) Authentication method and apparatus for network slice, and device and storage medium
CN115348631B (en) Switching control method, device, terminal and storage medium in ultra-dense network
US20250056214A1 (en) Protecting capability indication in ue initiated visited public land mobile network (vplmn) slice-based steering of roaming (sor)
CN116963262B (en) Relay transmission method, switching method, device and user equipment
WO2024040818A1 (en) Near-field communication control method, traffic statistics method, apparatus, and medium
WO2022104740A1 (en) Method and apparatus for updating non-public network subscription information
WO2025066757A1 (en) Communication method and apparatus
WO2025055627A1 (en) Communication method and apparatus

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination