[go: up one dir, main page]

WO2025008863A1 - Method and system for granting a data traffic access associated with a target network - Google Patents

Method and system for granting a data traffic access associated with a target network Download PDF

Info

Publication number
WO2025008863A1
WO2025008863A1 PCT/IN2024/050733 IN2024050733W WO2025008863A1 WO 2025008863 A1 WO2025008863 A1 WO 2025008863A1 IN 2024050733 W IN2024050733 W IN 2024050733W WO 2025008863 A1 WO2025008863 A1 WO 2025008863A1
Authority
WO
WIPO (PCT)
Prior art keywords
address
target network
prestored
network
addresses
Prior art date
Application number
PCT/IN2024/050733
Other languages
French (fr)
Inventor
Aayush Bhatnagar
Mukesh Singh
Ramavatar JANGID
Abhishek Doon
Mandeep Singh KASHYAP
Rachana LAHAMODAK
Avinash Kumar
Arunima SAXENA
Original Assignee
Jio Platforms Limited
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Jio Platforms Limited filed Critical Jio Platforms Limited
Publication of WO2025008863A1 publication Critical patent/WO2025008863A1/en

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/03Protecting confidentiality, e.g. by encryption
    • H04W12/033Protecting confidentiality, e.g. by encryption of the user plane, e.g. user's traffic
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L61/00Network arrangements, protocols or services for addressing or naming
    • H04L61/45Network directories; Name-to-address mapping
    • H04L61/4505Network directories; Name-to-address mapping using standardised directories; using standardised directory access protocols
    • H04L61/4511Network directories; Name-to-address mapping using standardised directories; using standardised directory access protocols using domain name system [DNS]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/08Access security
    • H04W12/086Access security using security domains
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/60Context-dependent security

Definitions

  • Embodiments of the present disclosure generally relate to network performance management systems. More particularly, embodiments of the present disclosure relate to granting a data traffic access associated with a target network.
  • BACKGROUND The following description of the related art is intended to provide background information pertaining to the field of the disclosure. This section may include certain aspects of the art that may be related to various features of the present disclosure. However, it should be appreciated that this section is used only to enhance the understanding of the reader with respect to the present disclosure, and not as admissions of the prior art. Wireless communication technology has rapidly evolved over the past few decades, with each generation bringing significant improvements and advancements.
  • the first generation of wireless communication technology was based on analog technology and offered only voice services.
  • 2G second-generation
  • Third generation (3G) technology marked the introduction of high-speed internet access, mobile video calling, and location-based services.
  • 4G fourth-generation
  • the fourth-generation (4G) technology revolutionized wireless communication with faster data speeds, better network coverage, and improved security.
  • 5G fifth-generation
  • wireless communication technology has become more advanced, sophisticated, and capable of delivering more services to its users. Accessing the internet has been a new norm in the modern world.
  • a user equipment wants to access a certain website, through a browser, the UE requests the IP address of the website through Uniform Resource Locator (URL), wherein User Plane Function (UPF) requests the Domain Name System (DNS) to provide the IP address of the website associated with the URL.
  • the DNS provides the IP address and the UE access the website based on this IP address.
  • URL Filtering when used in the system results in DNS queries to fetch the IPs & then the traffic is matched with the URLs and/or IPs. This procedure increases unnecessary transactions on the network and increases time for accessing the website, wherein the IP address is already known to the UPF in case of an internal network.
  • An aspect of the present disclosure may relate to a method for granting a data traffic access associated with a target network.
  • the method includes receiving, by a transceiver unit via a User Plane Function (UPF) in the target network from a user equipment (UE), a data request message, wherein the data request message comprises at least a first Internet Protocol (IP) address.
  • the method further includes retrieving, by the transceiver unit at the UPF in the target network from a database, a set of pre-stored Internet Protocol (prestored IP) addresses based on the data request message, wherein each prestored IP address from the set of prestored IP addresses is associated with the target network.
  • pre-stored IP pre-stored Internet Protocol
  • the method includes determining, by a processing unit at the UPF in the target network, an IP address match status associated with the first IP address based on the set of prestored IP addresses, wherein the IP address match status is at least one of a successful IP address match status and an unsuccessful IP address match status. Further, the method includes granting, by the processing unit from the UPF in the target network for the UE, the data traffic access associated with the target network based on determining the successful IP address match status associated with the first IP address.
  • the successful IP address match status associated with the first IP address is determined in an event the first IP address is a successful match with one of the prestored IP address from the set of prestored IP addresses.
  • the unsuccessful IP address match status associated with the first IP address is determined in an event the first IP address is an unsuccessful match with each of the prestored IP address from the set of prestored IP addresses.
  • the method further comprises initiating, by the processing unit, a network connection barring action between the target network and the UE based on the unsuccessful IP address match status, wherein the network connection barring action is at least a data traffic access barring action at the UE.
  • the target network is a radio access network associated with a specific wireless communication service provider. Another aspect of the present disclosure may relate to a system for granting a data traffic access associated with a target network.
  • the system includes a transceiver unit.
  • the transceiver unit is configured to receive, at a User Plane Function (UPF) in the target network from a user equipment (UE), a data request message, wherein the data request message comprises at least a first Internet Protocol (IP) address; and retrieve, at the UPF in the target network from a database, a set of pre- stored Internet Protocol (prestored IP) addresses based on the data request message, wherein each prestored IP address from the set of prestored IP addresses is associated with the target network.
  • the system further includes a processing unit connected to at least the transceiver unit.
  • the processing unit is configured to determine, at the UPF in the target network, an IP address match status associated with the first IP address based on the set of prestored IP addresses, wherein the IP address match status is at least one of a successful IP address match status and an unsuccessful IP address match status and grant, from the UPF in the target network at UE, the data traffic access associated with the target network based on determining the successful IP address match status associated with the first IP address.
  • Yet another aspect of the present disclosure may relate to a non-transitory computer readable storage medium storing instructions for granting a data traffic access associated with a target network, the instructions include executable code which, when executed by one or more units of a system, causes: a transceiver unit of the system to receive from a user equipment (UE), a data request message, wherein the data request message comprises at least a first Internet Protocol (IP) address; and retrieve, at the UPF in the target network from a database, a set of pre-stored Internet Protocol (prestored IP) addresses based on the data request message, wherein each prestored IP address from the set of prestored IP addresses is associated with the target network.
  • IP Internet Protocol
  • the executable code which when executed by one or more units of the system, causes a processing unit connected to the transceiver unit to: determine, at the UPF in the target network, an IP address match status associated with the first IP address based on the set of prestored IP addresses, wherein the IP address match status is at least one of a successful IP address match status and an unsuccessful IP address match status; and grant, from the UPF in the target network at UE, the data traffic access associated with the target network based on determining the successful IP address match status associated with the first IP address.
  • It is an object of the present disclosure to provide a system and a method for optimizing an internal network operation based on transmitting a targeted IP address to a UE. It is another object of the present disclosure to provide a solution that optimize internal network by reducing unnecessary transactions on the network. It is yet another object of the present disclosure to provide a solution to save the extra transaction which may be used to fetch the IPs from the DNS. DESCRIPTION OF THE DRAWINGS The accompanying drawings, which are incorporated herein, and constitute a part of this disclosure, illustrate exemplary embodiments of the disclosed methods and systems in which like reference numerals refer to the same parts throughout the different drawings. Components in the drawings are not necessarily to scale, emphasis instead being placed upon clearly illustrating the principles of the present disclosure.
  • FIG.1 illustrates an exemplary block diagram representation of 5th generation core (5GC) network architecture.
  • FIG. 2 illustrates an exemplary block diagram of a computing device upon which the features of the present disclosure may be implemented in accordance with exemplary implementation of the present disclosure.
  • FIG. 3 illustrates an exemplary block diagram of a system for granting a data traffic access associated with a target network, in accordance with exemplary implementations of the present disclosure.
  • 5GC 5th generation core
  • FIG.4 illustrates a method flow diagram for granting a data traffic access associated with a target network in accordance with exemplary implementations of the present disclosure.
  • any aspect or design described herein as “exemplary” and/or “demonstrative” is not necessarily to be construed as preferred or advantageous over other aspects or designs, nor is it meant to preclude equivalent exemplary structures and techniques known to those of ordinary skill in the art.
  • the terms “includes,” “has,” “contains,” and other similar words are used in either the detailed description or the claims, such terms are intended to be inclusive—in a manner similar to the term “comprising” as an open transition word—without precluding any additional or other elements.
  • a “processing unit” or “processor” or “operating processor” includes one or more processors, wherein processor refers to any logic circuitry for processing instructions.
  • a processor may be a general-purpose processor, a special purpose processor, a conventional processor, a digital signal processor, a plurality of microprocessors, one or more microprocessors in association with a (Digital Signal Processing) DSP core, a controller, a microcontroller, Application Specific Integrated Circuits, Field Programmable Gate Array circuits, any other type of integrated circuits, etc.
  • the processor may perform signal coding data processing, input/output processing, and/or any other functionality that enables the working of the system according to the present disclosure. More specifically, the processor or processing unit is a hardware processor.
  • a user equipment may be any electrical, electronic and/or computing device or equipment, capable of implementing the features of the present disclosure.
  • the user equipment/device may include, but is not limited to, a mobile phone, smart phone, laptop, a general-purpose computer, desktop, personal digital assistant, tablet computer, wearable device or any other computing device which is capable of implementing the features of the present disclosure.
  • the user device may contain at least one input means configured to receive an input from at least one of a transceiver unit, a processing unit, a storage unit, a detection unit and any other such unit(s) which are required to implement the features of the present disclosure.
  • storage unit or “memory unit” refers to a machine or computer-readable medium including any mechanism for storing information in a form readable by a computer or similar machine.
  • a computer-readable medium includes read-only memory (“ROM”), random access memory (“RAM”), magnetic disk storage media, optical storage media, flash memory devices or other types of machine-accessible storage media.
  • the storage unit stores at least the data that may be required by one or more units of the system to perform their respective functions.
  • interface refers to a shared boundary across which two or more separate components of a system exchange information or data.
  • the interface may also be referred to a set of rules or protocols that define communication or interaction of one or more modules or one or more units with each other, which also includes the methods, functions, or procedures that may be called.
  • All modules, units, components used herein, unless explicitly excluded herein, may be software modules or hardware processors, the processors being a general-purpose processor, a special purpose processor, a conventional processor, a digital signal processor (DSP), a plurality of microprocessors, one or more microprocessors in association with a DSP core, a controller, a microcontroller, Application Specific Integrated Circuits (ASIC), Field Programmable Gate Array circuits (FPGA), any other type of integrated circuits, etc.
  • the transceiver unit include at least one receiver and at least one transmitter configured respectively for receiving and transmitting data, signals, information or a combination thereof between units/components within the system and/or connected with the system.
  • the present disclosure aims to overcome the above-mentioned and other existing problems in this field of technology by providing method and system of granting a data traffic access associated with a target network.
  • the present disclosure provides a solution to provide at a User Plane Function (UPF), an IP based filtering of a data traffic in contrast to a URL based filtering which also gets complex many a times, and the performance takes a hit due to such URL filters.
  • UPF User Plane Function
  • IP based filtering provides an edge and is useful in barring situations where specific (say for e.g., in-house) websites are to be accessed.
  • the 5GC network architecture includes a user equipment (UE) [102], a radio access network (RAN) [104], an access and mobility management function (AMF) [106], a Session Management Function (SMF) [108], a Service Communication Proxy (SCP) [110], an Authentication Server Function (AUSF) [112], a Network Slice Specific Authentication and Authorization Function (NSSAAF) [114], a Network Slice Selection Function (NSSF) [116], a Network Exposure Function (NEF) [118], a Network Repository Function (NRF) [120], a Policy Control Function (PCF) [122], a Unified Data Management (UDM) [124], an application function (AF) [126], a User Plane Function (UPF) [128], a data network (DN) [130], wherein all the components are assumed to be connected to each other in a manner as obvious to the person skilled in the art for implementing features of the present disclosure.
  • UE user equipment
  • RAN radio access network
  • AMF Access and mobility management
  • Radio Access Network (RAN) is the part of a mobile telecommunications system that connects user equipment (UE) [102] to the core network (CN) and provides access to different types of networks (e.g., 5G network). It consists of radio base stations and the radio access technologies that enable wireless communication.
  • Access and Mobility Management Function (AMF) is a 5G core network function responsible for managing access and mobility aspects, such as UE registration, connection, and reachability. It also handles mobility management procedures like handovers and paging.
  • Session Management Function (SMF) is a 5G core network function responsible for managing session-related aspects, such as establishing, modifying, and releasing sessions.
  • Service Communication Proxy (SCP) [110] is a network function in the 5G core network that facilitates communication between other network functions by providing a secure and efficient messaging service. It acts as a mediator for service-based interfaces.
  • AUSF Authentication Server Function
  • NSSAAF Network Slice Specific Authentication and Authorization Function
  • Network Slice Selection Function (NSSF) [116] is a network function responsible for selecting the appropriate network slice for a UE based on factors such as subscription, requested services, and network policies.
  • Network Exposure Function (NEF) [118] is a network function that exposes capabilities and services of the 5G network to external applications, enabling integration with third-party services and applications.
  • Network Repository Function (NRF) [120] is a network function that acts as a central repository for information about available network functions and services. It facilitates the discovery and dynamic registration of network functions.
  • Policy Control Function (PCF) [122] is a network function responsible for policy control decisions, such as QoS, charging, and access control, based on subscriber information and network policies.
  • Unified Data Management [124] is a network function that centralizes the management of subscriber data, including authentication, authorization, and subscription information.
  • Application Function [126] is a network function that represents external applications interfacing with the 5G core network to access network capabilities and services.
  • User Plane Function [128] is a network function responsible for handling user data traffic, including packet routing, forwarding, and QoS enforcement.
  • Data Network [130] refers to a network that provides data services to user equipment (UE) in a telecommunications system. The data services may include but are not limited to Internet services, private data network related services. Referring to FIG.
  • the computing device [1000] may implement a method for granting a data traffic access associated with a target network utilising the system [300].
  • the computing device [1000] itself implements the method for granting a data traffic access associated with a target network using one or more units configured within the computing device [1000], wherein said one or more units are capable of implementing the features as disclosed in the present disclosure.
  • the computing device [1000] may include a bus [1002] or other communication mechanism for communicating information, and a hardware processor [1004] coupled with bus [1002] for processing information.
  • the hardware processor [1004] may be, for example, a general purpose microprocessor.
  • the computer system [1000] may also include a main memory [1006], such as a random access memory (RAM), or other dynamic storage device, coupled to the bus [1002] for storing information and instructions to be executed by the processor [1004].
  • the main memory [1006] also may be used for storing temporary variables or other intermediate information during execution of the instructions to be executed by the processor [1004].
  • Such instructions when stored in non-transitory storage media accessible to the processor [1004], render the computer system [1000] into a special-purpose machine that is customized to perform the operations specified in the instructions.
  • the computer system [1000] further includes a read only memory (ROM) [1008] or other static storage device coupled to the bus [1002] for storing static information and instructions for the processor [1004].
  • a storage device [1010] such as a magnetic disk, optical disk, or solid-state drive is provided and coupled to the bus [1002] for storing information and instructions.
  • the computer system [1000] may be coupled via the bus [1002] to a display [1012], such as a cathode ray tube (CRT), Liquid crystal Display (LCD), Light Emitting Diode (LED) display, Organic LED (OLED) display, etc. for displaying information to a computer user.
  • An input device [1014] including alphanumeric and other keys, touch screen input means, etc.
  • a cursor control [1016] such as a mouse, a trackball, or cursor direction keys, for communicating direction information and command selections to the processor [1004], and for controlling cursor movement on the display [1012].
  • This input device typically has two degrees of freedom in two axes, a first axis (e.g., x) and a second axis (e.g., y), that allow the device to specify positions in a plane.
  • the computer system [1000] may implement the techniques described herein using customized hard-wired logic, one or more ASICs or FPGAs, firmware and/or program logic which in combination with the computer system [1000] causes or programs the computer system [1000] to be a special-purpose machine.
  • the techniques herein are performed by the computer system [1000] in response to the processor [1004] executing one or more sequences of one or more instructions contained in the main memory [1006]. Such instructions may be read into the main memory [1006] from another storage medium, such as the storage device [1010]. Execution of the sequences of instructions contained in the main memory [1006] causes the processor [1004] to perform the process steps described herein.
  • the computer system [1000] also may include a communication interface [1018] coupled to the bus [1002].
  • the communication interface [1018] provides a two-way data communication coupling to a network link [1020] that is connected to a local network [1022].
  • the communication interface [1018] may be an integrated services digital network (ISDN) card, cable modem, satellite modem, or a modem to provide a data communication connection to a corresponding type of telephone line.
  • the communication interface [1018] may be a local area network (LAN) card to provide a data communication connection to a compatible LAN.
  • LAN local area network
  • Wireless links may also be implemented.
  • the communication interface [1018] sends and receives electrical, electromagnetic or optical signals that carry digital data streams representing various types of information.
  • the computer system [1000] can send messages and receive data, including program code, through the network(s), the network link [1020] and the communication interface [1018].
  • a server [1030] might transmit a requested code for an application program through the Internet [1028], the ISP [1026], the local network [1022] and the communication interface [1018].
  • the received code may be executed by the processor [1004] as it is received, and/or stored in the storage device [1010], or other non-volatile storage for later execution. Referring to FIG.
  • FIG. 3 an exemplary block diagram of a system [300] for granting a data traffic access associated with a target network, is shown, in accordance with the exemplary implementations of the present disclosure.
  • the system [300] comprises at least one transceiver unit [302] and at least one processing unit [304]. Also, all of the components/ units of the system [300] are assumed to be connected to each other unless otherwise indicated below. As shown in the figures all units shown within the system [300] should also be assumed to be connected to each other. Also, in FIG. 3 only a few units are shown, however, the system [300] may comprise multiple such units or the system [300] may comprise any such numbers of said units, as required to implement the features of the present disclosure.
  • the system [300] may be present in a network entity. In yet another implementation, the system [300] may be in connection with the network entity.
  • the system [300] is configured for granting a data traffic access associated with a target network, with the help of the interconnection between the components/units of the system [300].
  • the transceiver unit [302] is configured to receive, at a User Plane Function (UPF) in the target network (e.g., UPF [128] in 5G network [100] as depicted in FIG. 1) from a user equipment (UE), a data request message, wherein the data request message comprises at least a first Internet Protocol (IP) address.
  • UPF User Plane Function
  • the target network is a radio access network associated with a specific wireless communication service provider.
  • the UPF in a 5 th Generation network via the transceiver unit [302] receives a data message request to access a Uniform Resource Locator (URL).
  • the data message request includes an IP address related to the request. Therefore, the UPF receives IP addresses associated to the URL for which the access is requested.
  • the transceiver unit [302] is further configured to retrieve, at the UPF in the target network from a database, a set of pre-stored Internet Protocol (prestored IP) addresses based on the data request message, wherein each prestored IP address from the set of prestored IP addresses is associated with the target network.
  • prestored IP Internet Protocol
  • the transceiver unit [302] retrieves from a database ‘n’ number of pre-stored Internet Protocol (prestored IP) addresses, wherein “n” may be any positive integer from ‘1’ and the pre-stored Internet Protocol (prestored IP) address(es) are associated with the 5G network.
  • prestored IP Internet Protocol
  • the set of prestored IP addresses are associated with certain URL’s which may be allowed in the network in cases of internet blockages. For instance, during barring scenarios where entire internet in a 5G network is blocked but only certain websites are to be allowed, the pre-stored Internet Protocol (prestored IP) addresses are related to such websites.
  • the processing unit [304] is configured to determine, at the UPF in the target network, an IP address match status associated with the first IP address based on the set of prestored IP addresses, wherein the IP address match status is at least one of a successful IP address match status and an unsuccessful IP address match status.
  • the successful IP address match status associated with the first IP address is determined in an event the first IP address is a successful match with one of the prestored IP address from the set of prestored IP addresses.
  • the unsuccessful IP address match status associated with the first IP address is determined in an event the first IP address is an unsuccessful match with each of the prestored IP address from the set of prestored IP addresses.
  • the UPF via the processing unit [304] is configured to match and filter data traffic in accordance with the IP address provided in data message request.
  • the successful IP address match status associated with the IP address in the data message request (say target IP address) is determined by the processing unit [304] when the target IP address from the data message request matches with one of the prestored IP address from the set of prestored IP addresses at the UPF.
  • the unsuccessful IP address match status associated with the target IP address is determined by the processing unit [304] when the target IP address does not match with any of the prestored IP address from the set of prestored IP addresses at the UPF.
  • the processing unit [304] is further configured to grant, from the UPF in the target network at UE, the data traffic access associated with the target network based on determining the successful IP address match status associated with the first IP address.
  • the processing unit [304] is further configured to initiate, a network connection barring action between the target network and the UE based on the unsuccessful IP address match status, wherein the network connection barring action is at least a data traffic access barring action at the UE. Therefore, in an implementation of the present disclosure, when the IP address in the data message request matches with any of the IP addresses stored in the UPF, an access the URL for which the access is requested in the data message request is granted by the processing unit [304] in the 5G network.
  • the UPF via the processing unit [304] initiates barring at the UE, the access to the URL for which the access is requested in the data message request in an event the IP address in the data message request fails to match with any of the IP addresses stored in the UPF.
  • FIG. 4 an exemplary method flow diagram [400] for granting a data traffic access associated with a target network, in accordance with exemplary implementations of the present disclosure is shown.
  • the method [400] is performed by the system [300].
  • the system [300] may be present in a network entity or may be in connection with the network entity (say for e.g., the target network) to implement the features of the present disclosure.
  • the method [400] starts at step [402].
  • the method includes receiving, by a transceiver unit [302] via a User Plane Function (UPF) in the target network from a user equipment (UE), a data request message, wherein the data request message comprises at least a first Internet Protocol (IP) address.
  • the target network is a radio access network associated with a specific wireless communication service provider.
  • the UPF in a 5 th Generation network via the transceiver unit [302] receives a data message request to access a Uniform Resource Locator (URL).
  • the data message request includes an IP address related to the request. Therefore, the UPF receives IP addresses associated to the URL for which the access is requested.
  • URL Uniform Resource Locator
  • the method encompasses retrieving, by the transceiver unit [302] at the UPF in the target network from a database, a set of pre-stored Internet Protocol (prestored IP) addresses based on the data request message, wherein each prestored IP address from the set of prestored IP addresses is associated with the target network.
  • prestored IP Internet Protocol
  • the transceiver unit [302] retrieves from a database ‘n’ number of pre-stored Internet Protocol (prestored IP) addresses, wherein “n” may be any positive integer from ‘1’ and the pre-stored Internet Protocol (prestored IP) address(es) are associated with the 5G network.
  • prestored IP Internet Protocol
  • the set of prestored IP addresses are associated with certain URL’s which may be allowed in the network in cases of internet blockages. For instance, during barring scenarios where entire internet in a 5G network is blocked but only certain websites are to be allowed, the pre- stored Internet Protocol (prestored IP) addresses are related to such websites.
  • the method includes determining, by a processing unit [304] at the UPF in the target network, an IP address match status associated with the first IP address based on the set of prestored IP addresses, wherein the IP address match status is at least one of a successful IP address match status and an unsuccessful IP address match status.
  • the successful IP address match status associated with the first IP address is determined in an event the first IP address is a successful match with one of the prestored IP address from the set of prestored IP addresses.
  • the unsuccessful IP address match status associated with the first IP address is determined in an event the first IP address is an unsuccessful match with each of the prestored IP address from the set of prestored IP addresses.
  • the UPF via the processing unit [304] matches and filter data traffic in accordance with the IP address provided in data message request.
  • the successful IP address match status associated with the IP address in the data message request is determined by the processing unit [304] when the target IP address from the data message request matches with one of the prestored IP address from the set of prestored IP addresses at the UPF.
  • the unsuccessful IP address match status associated with the target IP address is determined by the processing unit [304] when the target IP address does not match with any of the prestored IP address from the set of prestored IP addresses at the UPF.
  • the method encompasses granting, by the processing unit [304] from the UPF in the target network for the UE, the data traffic access associated with the target network based on determining the successful IP address match status associated with the first IP address.
  • the method further comprises initiating, by the processing unit [304], a network connection barring action between the target network and the UE based on the unsuccessful IP address match status.
  • the network connection barring action is at least a data traffic access barring action at the UE, wherein the data traffic access barring action at the UE refers to a stoppage or barring of data facility (such as internet) at the UE. Therefore, the network connection barring action regulates prohibition of access to the target network by the user equipment (UE) for data/internet facilities.
  • the network connection barring action may include but not limited to prohibiting of at least one of: an incoming call traffic data at the UE, an outgoing call traffic data at the UE, and a message data at the UE. Therefore, in an implementation of the present disclosure, when the IP address in the data message request matches with any of the IP addresses stored in the UPF, an access the URL for which the access is requested in the data message request is granted by the processing unit [304] in the 5G network. Also, in another implementation, the UPF via the processing unit [304] initiates barring at the UE, the access to the URL for which the access is requested in the data message request in an event the IP address in the data message request fails to match with any of the IP addresses stored in the UPF.
  • the present disclosure further discloses a non-transitory computer readable storage medium storing instructions for granting a data traffic access associated with a target network, the instructions include executable code which, when executed by one or more units of a system, causes: a transceiver unit [302] of the system to receive, via a User Plane Function (UPF) in the target network from a user equipment (UE), a data request message; and retrieve, in the target network from a database, a set of pre-stored Internet Protocol (prestored IP) addresses based on the data request message, wherein each prestored IP address from the set of prestored IP addresses is associated with the target network.
  • UPF User Plane Function
  • UE user equipment
  • prestored IP Internet Protocol
  • the executable code which when executed by one or more units of the system, further causes a processing unit [304] of the system to: determine at the UPF in the first target network an IP address match status associated with the first IP address based on the set of prestored IP addresses, wherein the IP address match status is at least one of a successful IP address match status and an unsuccessful IP address match status; and grant from the UPF in the target network for the UE, the data traffic access associated with the target network based on determining the successful IP address match status associated with the first IP address.
  • the present disclosure provides a technically advanced solution for granting a data traffic access associated with a target network by matching the IP address associated with the first IP address on the basis of prestored IP addresses.
  • the present provides a system and a method for optimizing an internal network operation based on transmitting a targeted IP address to a UE.
  • the present disclosure further provides a solution that optimizes the internal network by reducing unnecessary transactions on the network.
  • the present disclosure further provides a solution to save the extra transaction which can be used to fetch the IPs from the DNS.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

The present disclosure relates to a method and system for granting data traffic access associated with a target network The method includes receiving, by transceiver unit [302] in target network from a user equipment (UE), a data request message including an IP address. The method further includes retrieving, by the transceiver unit [302] at UPF in the target network, a set of prestored IP addresses based on the data request message, wherein prestored IP address is associated with the target network. Further, the method includes: determining, by processing unit [304], IP address match status based on prestored IP addresses, wherein the IP address match status is a successful IP address match status or an unsuccessful IP address match; and granting, by processing unit [304], the data traffic access associated with the target network based on determining the successful IP address match status associated with the first IP address.

Description

METHOD AND SYSTEM FOR GRANTING A DATA TRAFFIC ACCESS ASSOCIATED WITH A TARGET NETWORK TECHNICAL FIELD Embodiments of the present disclosure generally relate to network performance management systems. More particularly, embodiments of the present disclosure relate to granting a data traffic access associated with a target network. BACKGROUND The following description of the related art is intended to provide background information pertaining to the field of the disclosure. This section may include certain aspects of the art that may be related to various features of the present disclosure. However, it should be appreciated that this section is used only to enhance the understanding of the reader with respect to the present disclosure, and not as admissions of the prior art. Wireless communication technology has rapidly evolved over the past few decades, with each generation bringing significant improvements and advancements. The first generation of wireless communication technology was based on analog technology and offered only voice services. However, with the advent of the second-generation (2G) technology, digital communication and data services became possible, and text messaging was introduced. Third generation (3G) technology marked the introduction of high-speed internet access, mobile video calling, and location-based services. The fourth-generation (4G) technology revolutionized wireless communication with faster data speeds, better network coverage, and improved security. Currently, the fifth-generation (5G) technology is being deployed, promising even faster data speeds, low latency, and the ability to connect multiple devices simultaneously. With each generation, wireless communication technology has become more advanced, sophisticated, and capable of delivering more services to its users. Accessing the internet has been a new norm in the modern world. When a user equipment (UE) wants to access a certain website, through a browser, the UE requests the IP address of the website through Uniform Resource Locator (URL), wherein User Plane Function (UPF) requests the Domain Name System (DNS) to provide the IP address of the website associated with the URL. The DNS provides the IP address and the UE access the website based on this IP address. URL Filtering when used in the system results in DNS queries to fetch the IPs & then the traffic is matched with the URLs and/or IPs. This procedure increases unnecessary transactions on the network and increases time for accessing the website, wherein the IP address is already known to the UPF in case of an internal network. Thus, there exists an imperative need in the art for granting a data traffic access associated with a target network, based on transmitting a targeted IP address to a UE, which the present disclosure aims to address. SUMMARY OF THE DISCLOSURE This section is provided to introduce certain aspects of the present disclosure in a simplified form that are further described below in the detailed description. This summary is not intended to identify the key features or the scope of the claimed subject matter. An aspect of the present disclosure may relate to a method for granting a data traffic access associated with a target network. The method includes receiving, by a transceiver unit via a User Plane Function (UPF) in the target network from a user equipment (UE), a data request message, wherein the data request message comprises at least a first Internet Protocol (IP) address. The method further includes retrieving, by the transceiver unit at the UPF in the target network from a database, a set of pre-stored Internet Protocol (prestored IP) addresses based on the data request message, wherein each prestored IP address from the set of prestored IP addresses is associated with the target network. Furthermore, the method includes determining, by a processing unit at the UPF in the target network, an IP address match status associated with the first IP address based on the set of prestored IP addresses, wherein the IP address match status is at least one of a successful IP address match status and an unsuccessful IP address match status. Further, the method includes granting, by the processing unit from the UPF in the target network for the UE, the data traffic access associated with the target network based on determining the successful IP address match status associated with the first IP address. In an exemplary aspect of the present disclosure, the successful IP address match status associated with the first IP address is determined in an event the first IP address is a successful match with one of the prestored IP address from the set of prestored IP addresses. In an exemplary aspect of the present disclosure, the unsuccessful IP address match status associated with the first IP address is determined in an event the first IP address is an unsuccessful match with each of the prestored IP address from the set of prestored IP addresses. In an exemplary aspect of the present disclosure, the method further comprises initiating, by the processing unit, a network connection barring action between the target network and the UE based on the unsuccessful IP address match status, wherein the network connection barring action is at least a data traffic access barring action at the UE. In an exemplary aspect of the present disclosure, the target network is a radio access network associated with a specific wireless communication service provider. Another aspect of the present disclosure may relate to a system for granting a data traffic access associated with a target network. The system includes a transceiver unit. The transceiver unit is configured to receive, at a User Plane Function (UPF) in the target network from a user equipment (UE), a data request message, wherein the data request message comprises at least a first Internet Protocol (IP) address; and retrieve, at the UPF in the target network from a database, a set of pre- stored Internet Protocol (prestored IP) addresses based on the data request message, wherein each prestored IP address from the set of prestored IP addresses is associated with the target network. The system further includes a processing unit connected to at least the transceiver unit. The processing unit is configured to determine, at the UPF in the target network, an IP address match status associated with the first IP address based on the set of prestored IP addresses, wherein the IP address match status is at least one of a successful IP address match status and an unsuccessful IP address match status and grant, from the UPF in the target network at UE, the data traffic access associated with the target network based on determining the successful IP address match status associated with the first IP address. Yet another aspect of the present disclosure may relate to a non-transitory computer readable storage medium storing instructions for granting a data traffic access associated with a target network, the instructions include executable code which, when executed by one or more units of a system, causes: a transceiver unit of the system to receive from a user equipment (UE), a data request message, wherein the data request message comprises at least a first Internet Protocol (IP) address; and retrieve, at the UPF in the target network from a database, a set of pre-stored Internet Protocol (prestored IP) addresses based on the data request message, wherein each prestored IP address from the set of prestored IP addresses is associated with the target network. The executable code which when executed by one or more units of the system, causes a processing unit connected to the transceiver unit to: determine, at the UPF in the target network, an IP address match status associated with the first IP address based on the set of prestored IP addresses, wherein the IP address match status is at least one of a successful IP address match status and an unsuccessful IP address match status; and grant, from the UPF in the target network at UE, the data traffic access associated with the target network based on determining the successful IP address match status associated with the first IP address. OBJECTS OF THE DISCLOSURE Some of the objects of the present disclosure, which at least one embodiment disclosed herein satisfies are listed herein below. It is an object of the present disclosure to provide a system and a method for optimizing an internal network operation based on transmitting a targeted IP address to a UE. It is another object of the present disclosure to provide a solution that optimize internal network by reducing unnecessary transactions on the network. It is yet another object of the present disclosure to provide a solution to save the extra transaction which may be used to fetch the IPs from the DNS. DESCRIPTION OF THE DRAWINGS The accompanying drawings, which are incorporated herein, and constitute a part of this disclosure, illustrate exemplary embodiments of the disclosed methods and systems in which like reference numerals refer to the same parts throughout the different drawings. Components in the drawings are not necessarily to scale, emphasis instead being placed upon clearly illustrating the principles of the present disclosure. Also, the embodiments shown in the figures are not to be construed as limiting the disclosure, but the possible variants of the method and system according to the disclosure are illustrated herein to highlight the advantages of the disclosure. It will be appreciated by those skilled in the art that disclosure of such drawings includes disclosure of electrical components or circuitry commonly used to implement such components. FIG.1 illustrates an exemplary block diagram representation of 5th generation core (5GC) network architecture. FIG. 2 illustrates an exemplary block diagram of a computing device upon which the features of the present disclosure may be implemented in accordance with exemplary implementation of the present disclosure. FIG. 3 illustrates an exemplary block diagram of a system for granting a data traffic access associated with a target network, in accordance with exemplary implementations of the present disclosure. FIG.4 illustrates a method flow diagram for granting a data traffic access associated with a target network in accordance with exemplary implementations of the present disclosure. The foregoing shall be more apparent from the following more detailed description of the disclosure. DETAILED DESCRIPTION In the following description, for the purposes of explanation, various specific details are set forth in order to provide a thorough understanding of embodiments of the present disclosure. It will be apparent, however, that embodiments of the present disclosure may be practiced without these specific details. Several features described hereafter may each be used independently of one another or with any combination of other features. An individual feature may not address any of the problems discussed above or might address only some of the problems discussed above. The ensuing description provides exemplary embodiments only, and is not intended to limit the scope, applicability, or configuration of the disclosure. Rather, the ensuing description of the exemplary embodiments will provide those skilled in the art with an enabling description for implementing an exemplary embodiment. It should be understood that various changes may be made in the function and arrangement of elements without departing from the spirit and scope of the disclosure as set forth. Specific details are given in the following description to provide a thorough understanding of the embodiments. However, it will be understood by one of ordinary skill in the art that the embodiments may be practiced without these specific details. For example, circuits, systems, processes, and other components may be shown as components in block diagram form in order not to obscure the embodiments in unnecessary detail. Also, it is noted that individual embodiments may be described as a process which is depicted as a flowchart, a flow diagram, a data flow diagram, a structure diagram, or a block diagram. Although a flowchart may describe the operations as a sequential process, many of the operations may be performed in parallel or concurrently. In addition, the order of the operations may be re- arranged. A process is terminated when its operations are completed but could have additional steps not included in a figure. The word “exemplary” and/or “demonstrative” is used herein to mean serving as an example, instance, or illustration. For the avoidance of doubt, the subject matter disclosed herein is not limited by such examples. In addition, any aspect or design described herein as “exemplary” and/or “demonstrative” is not necessarily to be construed as preferred or advantageous over other aspects or designs, nor is it meant to preclude equivalent exemplary structures and techniques known to those of ordinary skill in the art. Furthermore, to the extent that the terms “includes,” “has,” “contains,” and other similar words are used in either the detailed description or the claims, such terms are intended to be inclusive—in a manner similar to the term “comprising” as an open transition word—without precluding any additional or other elements. As used herein, a “processing unit” or “processor” or “operating processor” includes one or more processors, wherein processor refers to any logic circuitry for processing instructions. A processor may be a general-purpose processor, a special purpose processor, a conventional processor, a digital signal processor, a plurality of microprocessors, one or more microprocessors in association with a (Digital Signal Processing) DSP core, a controller, a microcontroller, Application Specific Integrated Circuits, Field Programmable Gate Array circuits, any other type of integrated circuits, etc. The processor may perform signal coding data processing, input/output processing, and/or any other functionality that enables the working of the system according to the present disclosure. More specifically, the processor or processing unit is a hardware processor. As used herein, “a user equipment”, “a user device”, “a smart-user-device”, “a smart-device”, “an electronic device”, “a mobile device”, “a handheld device”, “a wireless communication device”, “a mobile communication device”, “a communication device” may be any electrical, electronic and/or computing device or equipment, capable of implementing the features of the present disclosure. The user equipment/device may include, but is not limited to, a mobile phone, smart phone, laptop, a general-purpose computer, desktop, personal digital assistant, tablet computer, wearable device or any other computing device which is capable of implementing the features of the present disclosure. Also, the user device may contain at least one input means configured to receive an input from at least one of a transceiver unit, a processing unit, a storage unit, a detection unit and any other such unit(s) which are required to implement the features of the present disclosure. As used herein, “storage unit” or “memory unit” refers to a machine or computer-readable medium including any mechanism for storing information in a form readable by a computer or similar machine. For example, a computer-readable medium includes read-only memory (“ROM”), random access memory (“RAM”), magnetic disk storage media, optical storage media, flash memory devices or other types of machine-accessible storage media. The storage unit stores at least the data that may be required by one or more units of the system to perform their respective functions. As used herein “interface” or “user interface refers to a shared boundary across which two or more separate components of a system exchange information or data. The interface may also be referred to a set of rules or protocols that define communication or interaction of one or more modules or one or more units with each other, which also includes the methods, functions, or procedures that may be called. All modules, units, components used herein, unless explicitly excluded herein, may be software modules or hardware processors, the processors being a general-purpose processor, a special purpose processor, a conventional processor, a digital signal processor (DSP), a plurality of microprocessors, one or more microprocessors in association with a DSP core, a controller, a microcontroller, Application Specific Integrated Circuits (ASIC), Field Programmable Gate Array circuits (FPGA), any other type of integrated circuits, etc. As used herein the transceiver unit include at least one receiver and at least one transmitter configured respectively for receiving and transmitting data, signals, information or a combination thereof between units/components within the system and/or connected with the system. As discussed in the background section, the current known solutions have several shortcomings. The present disclosure aims to overcome the above-mentioned and other existing problems in this field of technology by providing method and system of granting a data traffic access associated with a target network. Particularly, the present disclosure provides a solution to provide at a User Plane Function (UPF), an IP based filtering of a data traffic in contrast to a URL based filtering which also gets complex many a times, and the performance takes a hit due to such URL filters. It is pertinent to note that such implementation of IP based filtering provides an edge and is useful in barring situations where specific (say for e.g., in-house) websites are to be accessed. Further, the solution as disclosed in the present disclosure is technically advanced over the existing solutions as is very beneficial during barring scenarios where entire internet is blocked but only certain websites are to be allowed. Moreover, this solution saves extra transactions which may be used to fetch the IPs from the DNS. Hereinafter, exemplary embodiments of the present disclosure will be described with reference to the accompanying drawings. Referring to FIG. 1 that illustrates an exemplary block diagram representation of 5th generation core (5GC) network architecture, in accordance with exemplary implementation of the present disclosure. As shown in FIG. 1, the 5GC network architecture [100] includes a user equipment (UE) [102], a radio access network (RAN) [104], an access and mobility management function (AMF) [106], a Session Management Function (SMF) [108], a Service Communication Proxy (SCP) [110], an Authentication Server Function (AUSF) [112], a Network Slice Specific Authentication and Authorization Function (NSSAAF) [114], a Network Slice Selection Function (NSSF) [116], a Network Exposure Function (NEF) [118], a Network Repository Function (NRF) [120], a Policy Control Function (PCF) [122], a Unified Data Management (UDM) [124], an application function (AF) [126], a User Plane Function (UPF) [128], a data network (DN) [130], wherein all the components are assumed to be connected to each other in a manner as obvious to the person skilled in the art for implementing features of the present disclosure. Radio Access Network (RAN) [104] is the part of a mobile telecommunications system that connects user equipment (UE) [102] to the core network (CN) and provides access to different types of networks (e.g., 5G network). It consists of radio base stations and the radio access technologies that enable wireless communication. Access and Mobility Management Function (AMF) [106] is a 5G core network function responsible for managing access and mobility aspects, such as UE registration, connection, and reachability. It also handles mobility management procedures like handovers and paging. Session Management Function (SMF) [108] is a 5G core network function responsible for managing session-related aspects, such as establishing, modifying, and releasing sessions. It coordinates with the User Plane Function (UPF) for data forwarding and handles IP address allocation and QoS enforcement. Service Communication Proxy (SCP) [110] is a network function in the 5G core network that facilitates communication between other network functions by providing a secure and efficient messaging service. It acts as a mediator for service-based interfaces. Authentication Server Function (AUSF) [112] is a network function in the 5G core responsible for authenticating UEs during registration and providing security services. It generates and verifies authentication vectors and tokens. Network Slice Specific Authentication and Authorization Function (NSSAAF) [114] is a network function that provides authentication and authorization services specific to network slices. It ensures that UEs can access only the slices for which they are authorized. Network Slice Selection Function (NSSF) [116] is a network function responsible for selecting the appropriate network slice for a UE based on factors such as subscription, requested services, and network policies. Network Exposure Function (NEF) [118] is a network function that exposes capabilities and services of the 5G network to external applications, enabling integration with third-party services and applications. Network Repository Function (NRF) [120] is a network function that acts as a central repository for information about available network functions and services. It facilitates the discovery and dynamic registration of network functions. Policy Control Function (PCF) [122] is a network function responsible for policy control decisions, such as QoS, charging, and access control, based on subscriber information and network policies. Unified Data Management (UDM) [124] is a network function that centralizes the management of subscriber data, including authentication, authorization, and subscription information. Application Function (AF) [126] is a network function that represents external applications interfacing with the 5G core network to access network capabilities and services. User Plane Function (UPF) [128] is a network function responsible for handling user data traffic, including packet routing, forwarding, and QoS enforcement. Data Network (DN) [130] refers to a network that provides data services to user equipment (UE) in a telecommunications system. The data services may include but are not limited to Internet services, private data network related services. Referring to FIG. 2 that illustrates an exemplary block diagram of a computing device [1000] upon which the features of the present disclosure may be implemented in accordance with exemplary implementation of the present disclosure. In an implementation, the computing device [1000] may implement a method for granting a data traffic access associated with a target network utilising the system [300]. In another implementation, the computing device [1000] itself implements the method for granting a data traffic access associated with a target network using one or more units configured within the computing device [1000], wherein said one or more units are capable of implementing the features as disclosed in the present disclosure. The computing device [1000] may include a bus [1002] or other communication mechanism for communicating information, and a hardware processor [1004] coupled with bus [1002] for processing information. The hardware processor [1004] may be, for example, a general purpose microprocessor. The computer system [1000] may also include a main memory [1006], such as a random access memory (RAM), or other dynamic storage device, coupled to the bus [1002] for storing information and instructions to be executed by the processor [1004]. The main memory [1006] also may be used for storing temporary variables or other intermediate information during execution of the instructions to be executed by the processor [1004]. Such instructions, when stored in non-transitory storage media accessible to the processor [1004], render the computer system [1000] into a special-purpose machine that is customized to perform the operations specified in the instructions. The computer system [1000] further includes a read only memory (ROM) [1008] or other static storage device coupled to the bus [1002] for storing static information and instructions for the processor [1004]. A storage device [1010], such as a magnetic disk, optical disk, or solid-state drive is provided and coupled to the bus [1002] for storing information and instructions. The computer system [1000] may be coupled via the bus [1002] to a display [1012], such as a cathode ray tube (CRT), Liquid crystal Display (LCD), Light Emitting Diode (LED) display, Organic LED (OLED) display, etc. for displaying information to a computer user. An input device [1014], including alphanumeric and other keys, touch screen input means, etc. may be coupled to the bus [1002] for communicating information and command selections to the processor [1004]. Another type of user input device may be a cursor control [1016], such as a mouse, a trackball, or cursor direction keys, for communicating direction information and command selections to the processor [1004], and for controlling cursor movement on the display [1012]. This input device typically has two degrees of freedom in two axes, a first axis (e.g., x) and a second axis (e.g., y), that allow the device to specify positions in a plane. The computer system [1000] may implement the techniques described herein using customized hard-wired logic, one or more ASICs or FPGAs, firmware and/or program logic which in combination with the computer system [1000] causes or programs the computer system [1000] to be a special-purpose machine. According to one implementation, the techniques herein are performed by the computer system [1000] in response to the processor [1004] executing one or more sequences of one or more instructions contained in the main memory [1006]. Such instructions may be read into the main memory [1006] from another storage medium, such as the storage device [1010]. Execution of the sequences of instructions contained in the main memory [1006] causes the processor [1004] to perform the process steps described herein. In alternative implementations of the present disclosure, hard-wired circuitry may be used in place of or in combination with software instructions. The computer system [1000] also may include a communication interface [1018] coupled to the bus [1002]. The communication interface [1018] provides a two-way data communication coupling to a network link [1020] that is connected to a local network [1022]. For example, the communication interface [1018] may be an integrated services digital network (ISDN) card, cable modem, satellite modem, or a modem to provide a data communication connection to a corresponding type of telephone line. As another example, the communication interface [1018] may be a local area network (LAN) card to provide a data communication connection to a compatible LAN. Wireless links may also be implemented. In any such implementation, the communication interface [1018] sends and receives electrical, electromagnetic or optical signals that carry digital data streams representing various types of information. The computer system [1000] can send messages and receive data, including program code, through the network(s), the network link [1020] and the communication interface [1018]. In the Internet example, a server [1030] might transmit a requested code for an application program through the Internet [1028], the ISP [1026], the local network [1022] and the communication interface [1018]. The received code may be executed by the processor [1004] as it is received, and/or stored in the storage device [1010], or other non-volatile storage for later execution. Referring to FIG. 3, an exemplary block diagram of a system [300] for granting a data traffic access associated with a target network, is shown, in accordance with the exemplary implementations of the present disclosure. The system [300] comprises at least one transceiver unit [302] and at least one processing unit [304]. Also, all of the components/ units of the system [300] are assumed to be connected to each other unless otherwise indicated below. As shown in the figures all units shown within the system [300] should also be assumed to be connected to each other. Also, in FIG. 3 only a few units are shown, however, the system [300] may comprise multiple such units or the system [300] may comprise any such numbers of said units, as required to implement the features of the present disclosure. Further, in an implementation, the system [300] may be present in a network entity. In yet another implementation, the system [300] may be in connection with the network entity. The system [300] is configured for granting a data traffic access associated with a target network, with the help of the interconnection between the components/units of the system [300]. To grant the data traffic access associated with the target network, initially the transceiver unit [302] is configured to receive, at a User Plane Function (UPF) in the target network (e.g., UPF [128] in 5G network [100] as depicted in FIG. 1) from a user equipment (UE), a data request message, wherein the data request message comprises at least a first Internet Protocol (IP) address. Also, as used herein the target network is a radio access network associated with a specific wireless communication service provider. For instance, the UPF in a 5th Generation network, via the transceiver unit [302] receives a data message request to access a Uniform Resource Locator (URL). The data message request includes an IP address related to the request. Therefore, the UPF receives IP addresses associated to the URL for which the access is requested. The transceiver unit [302] is further configured to retrieve, at the UPF in the target network from a database, a set of pre-stored Internet Protocol (prestored IP) addresses based on the data request message, wherein each prestored IP address from the set of prestored IP addresses is associated with the target network. Therefore, in an implementation, once the UPF in the 5G network receives the data message request, then based on the data message request the transceiver unit [302] retrieves from a database ‘n’ number of pre-stored Internet Protocol (prestored IP) addresses, wherein “n” may be any positive integer from ‘1’ and the pre-stored Internet Protocol (prestored IP) address(es) are associated with the 5G network. In an implementation, the set of prestored IP addresses are associated with certain URL’s which may be allowed in the network in cases of internet blockages. For instance, during barring scenarios where entire internet in a 5G network is blocked but only certain websites are to be allowed, the pre-stored Internet Protocol (prestored IP) addresses are related to such websites. Thereafter, the processing unit [304] is configured to determine, at the UPF in the target network, an IP address match status associated with the first IP address based on the set of prestored IP addresses, wherein the IP address match status is at least one of a successful IP address match status and an unsuccessful IP address match status. The successful IP address match status associated with the first IP address is determined in an event the first IP address is a successful match with one of the prestored IP address from the set of prestored IP addresses. The unsuccessful IP address match status associated with the first IP address is determined in an event the first IP address is an unsuccessful match with each of the prestored IP address from the set of prestored IP addresses. In an embodiment of the present disclosure, the UPF via the processing unit [304] is configured to match and filter data traffic in accordance with the IP address provided in data message request. The successful IP address match status associated with the IP address in the data message request (say target IP address) is determined by the processing unit [304] when the target IP address from the data message request matches with one of the prestored IP address from the set of prestored IP addresses at the UPF. Further, the unsuccessful IP address match status associated with the target IP address is determined by the processing unit [304] when the target IP address does not match with any of the prestored IP address from the set of prestored IP addresses at the UPF. The processing unit [304] is further configured to grant, from the UPF in the target network at UE, the data traffic access associated with the target network based on determining the successful IP address match status associated with the first IP address. The processing unit [304] is further configured to initiate, a network connection barring action between the target network and the UE based on the unsuccessful IP address match status, wherein the network connection barring action is at least a data traffic access barring action at the UE. Therefore, in an implementation of the present disclosure, when the IP address in the data message request matches with any of the IP addresses stored in the UPF, an access the URL for which the access is requested in the data message request is granted by the processing unit [304] in the 5G network. Also, in another implementation, the UPF via the processing unit [304] initiates barring at the UE, the access to the URL for which the access is requested in the data message request in an event the IP address in the data message request fails to match with any of the IP addresses stored in the UPF. Referring to FIG. 4, an exemplary method flow diagram [400] for granting a data traffic access associated with a target network, in accordance with exemplary implementations of the present disclosure is shown. In an implementation the method [400] is performed by the system [300]. Further, in an implementation, the system [300] may be present in a network entity or may be in connection with the network entity (say for e.g., the target network) to implement the features of the present disclosure. Also, as shown in FIG.4, the method [400] starts at step [402]. At step [404], the method includes receiving, by a transceiver unit [302] via a User Plane Function (UPF) in the target network from a user equipment (UE), a data request message, wherein the data request message comprises at least a first Internet Protocol (IP) address. The target network is a radio access network associated with a specific wireless communication service provider. For instance, the UPF in a 5th Generation network, via the transceiver unit [302] receives a data message request to access a Uniform Resource Locator (URL). The data message request includes an IP address related to the request. Therefore, the UPF receives IP addresses associated to the URL for which the access is requested. Further at step [406], the method encompasses retrieving, by the transceiver unit [302] at the UPF in the target network from a database, a set of pre-stored Internet Protocol (prestored IP) addresses based on the data request message, wherein each prestored IP address from the set of prestored IP addresses is associated with the target network. Therefore, in an implementation, once the UPF in the 5G network receives the data message request, then based on the data message request the transceiver unit [302] retrieves from a database ‘n’ number of pre-stored Internet Protocol (prestored IP) addresses, wherein “n” may be any positive integer from ‘1’ and the pre-stored Internet Protocol (prestored IP) address(es) are associated with the 5G network. In an implementation, the set of prestored IP addresses are associated with certain URL’s which may be allowed in the network in cases of internet blockages. For instance, during barring scenarios where entire internet in a 5G network is blocked but only certain websites are to be allowed, the pre- stored Internet Protocol (prestored IP) addresses are related to such websites. Next, at step [408], the method includes determining, by a processing unit [304] at the UPF in the target network, an IP address match status associated with the first IP address based on the set of prestored IP addresses, wherein the IP address match status is at least one of a successful IP address match status and an unsuccessful IP address match status. The successful IP address match status associated with the first IP address is determined in an event the first IP address is a successful match with one of the prestored IP address from the set of prestored IP addresses. The unsuccessful IP address match status associated with the first IP address is determined in an event the first IP address is an unsuccessful match with each of the prestored IP address from the set of prestored IP addresses. In an embodiment of the present disclosure, the UPF via the processing unit [304] matches and filter data traffic in accordance with the IP address provided in data message request. The successful IP address match status associated with the IP address in the data message request (say target IP address) is determined by the processing unit [304] when the target IP address from the data message request matches with one of the prestored IP address from the set of prestored IP addresses at the UPF. Further, the unsuccessful IP address match status associated with the target IP address is determined by the processing unit [304] when the target IP address does not match with any of the prestored IP address from the set of prestored IP addresses at the UPF. Next at step [410], the method encompasses granting, by the processing unit [304] from the UPF in the target network for the UE, the data traffic access associated with the target network based on determining the successful IP address match status associated with the first IP address. The method further comprises initiating, by the processing unit [304], a network connection barring action between the target network and the UE based on the unsuccessful IP address match status. The network connection barring action is at least a data traffic access barring action at the UE, wherein the data traffic access barring action at the UE refers to a stoppage or barring of data facility (such as internet) at the UE. Therefore, the network connection barring action regulates prohibition of access to the target network by the user equipment (UE) for data/internet facilities. Moreover, in an implementation, the network connection barring action may include but not limited to prohibiting of at least one of: an incoming call traffic data at the UE, an outgoing call traffic data at the UE, and a message data at the UE. Therefore, in an implementation of the present disclosure, when the IP address in the data message request matches with any of the IP addresses stored in the UPF, an access the URL for which the access is requested in the data message request is granted by the processing unit [304] in the 5G network. Also, in another implementation, the UPF via the processing unit [304] initiates barring at the UE, the access to the URL for which the access is requested in the data message request in an event the IP address in the data message request fails to match with any of the IP addresses stored in the UPF. The method comes to an end at step [412]. The present disclosure further discloses a non-transitory computer readable storage medium storing instructions for granting a data traffic access associated with a target network, the instructions include executable code which, when executed by one or more units of a system, causes: a transceiver unit [302] of the system to receive, via a User Plane Function (UPF) in the target network from a user equipment (UE), a data request message; and retrieve, in the target network from a database, a set of pre-stored Internet Protocol (prestored IP) addresses based on the data request message, wherein each prestored IP address from the set of prestored IP addresses is associated with the target network. The executable code which when executed by one or more units of the system, further causes a processing unit [304] of the system to: determine at the UPF in the first target network an IP address match status associated with the first IP address based on the set of prestored IP addresses, wherein the IP address match status is at least one of a successful IP address match status and an unsuccessful IP address match status; and grant from the UPF in the target network for the UE, the data traffic access associated with the target network based on determining the successful IP address match status associated with the first IP address. As is evident from the above, the present disclosure provides a technically advanced solution for granting a data traffic access associated with a target network by matching the IP address associated with the first IP address on the basis of prestored IP addresses. The present provides a system and a method for optimizing an internal network operation based on transmitting a targeted IP address to a UE. The present disclosure further provides a solution that optimizes the internal network by reducing unnecessary transactions on the network. The present disclosure further provides a solution to save the extra transaction which can be used to fetch the IPs from the DNS. While considerable emphasis has been placed herein on the disclosed implementations, it will be appreciated that many implementations can be made and that many changes can be made to the implementations without departing from the principles of the present disclosure. These and other changes in the implementations of the present disclosure will be apparent to those skilled in the art, whereby it is to be understood that the foregoing descriptive matter to be implemented is illustrative and non-limiting.

Claims

We Claim: 1. A method for granting a data traffic access associated with a target network, the method comprising: ^ receiving, by a transceiver unit [302] via a User Plane Function (UPF) in the target network from a user equipment (UE), a data request message, wherein the data request message comprises at least a first Internet Protocol (IP) address; ^ retrieving, by the transceiver unit [302] at the UPF in the target network from a database, a set of pre-stored Internet Protocol (prestored IP) addresses based on the data request message, wherein each prestored IP address from the set of prestored IP addresses is associated with the target network; ^ determining, by a processing unit [304] at the UPF in the target network, an IP address match status associated with the first IP address based on the set of prestored IP addresses, wherein the IP address match status is at least one of a successful IP address match status and an unsuccessful IP address match status; and ^ granting, by the processing unit [304] from the UPF in the target network for the UE, the data traffic access associated with the target network based on determining the successful IP address match status associated with the first IP address.
2. The method as claimed in claim 1, wherein the successful IP address match status associated with the first IP address is determined in an event the first IP address is a successful match with one of the prestored IP address from the set of prestored IP addresses.
3. The method as claimed in claim 1, wherein the unsuccessful IP address match status associated with the first IP address is determined in an event the first IP address is an unsuccessful match with each of the prestored IP address from the set of prestored IP addresses.
4. The method as claimed in claim 3, further comprises initiating, by the processing unit [304], a network connection barring action between the target network and the UE based on the unsuccessful IP address match status, wherein the network connection barring action is at least a data traffic access barring action at the UE.
5. The method as claimed in claim 1, wherein the target network is a radio access network associated with a specific wireless communication service provider.
6. A system [300] for granting a data traffic access associated with a target network, the system [300] comprises: ^ a transceiver unit [302], wherein the transceiver unit [302] is configured to: x receive, at a User Plane Function (UPF) in the target network from a user equipment (UE), a data request message, wherein the data request message comprises at least a first Internet Protocol (IP) address, and x retrieve, at the UPF in the target network from a database, a set of pre-stored Internet Protocol (prestored IP) addresses based on the data request message, wherein each prestored IP address from the set of prestored IP addresses is associated with the target network; and ^ a processing unit [304] connected to at least the transceiver unit [302], wherein the processing unit [304] is configured to: x determine, at the UPF in the target network, an IP address match status associated with the first IP address based on the set of prestored IP addresses, wherein the IP address match status is at least one of a successful IP address match status and an unsuccessful IP address match status, and x grant, from the UPF in the target network at UE, the data traffic access associated with the target network based on determining the successful IP address match status associated with the first IP address.
7. The system [300] as claimed in claim 6, wherein the successful IP address match status associated with the first IP address is determined in an event the first IP address is a successful match with one of the prestored IP address from the set of prestored IP addresses.
8. The system [300] as claimed in claim 6, wherein the unsuccessful IP address match status associated with the first IP address is determined in an event the first IP address is an unsuccessful match with each of the prestored IP address from the set of prestored IP addresses.
9. The system [300] as claimed in claim 8, wherein the processing unit [304] is further configured to initiate, a network connection barring action between the target network and the UE based on the unsuccessful IP address match status, wherein the network connection barring action is at least a data traffic access barring action at the UE.
10. The system as claimed in claim 6, wherein the target network is a radio access network associated with a specific wireless communication service provider.
11. A non-transitory computer readable storage medium storing instructions for granting a data traffic access associated with a target network, the instructions include executable code which, when executed by one or more units of a system [300], causes: a transceiver unit [302] of the system [300] to: receive, via a User Plane Function (UPF) in the target network from a user equipment (UE), a data request message, wherein the data request message comprises at least a first Internet Protocol (IP) address, and retrieve, in the target network from a database, a set of pre-stored Internet Protocol (prestored IP) addresses based on the data request message, wherein each prestored IP address from the set of prestored IP addresses is associated with the target network; and a processing unit [304] of the system [300] to: determine at the UPF in the first target network an IP address match status associated with the first IP address based on the set of prestored IP addresses, wherein the IP address match status is at least one of a successful IP address match status and an unsuccessful IP address match status, and grant from the UPF in the target network for the UE, the data traffic access associated with the target network based on determining the successful IP address match status associated with the first IP address.
PCT/IN2024/050733 2023-07-03 2024-06-11 Method and system for granting a data traffic access associated with a target network WO2025008863A1 (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
IN202321044324 2023-07-03
IN202321044324 2023-07-03

Publications (1)

Publication Number Publication Date
WO2025008863A1 true WO2025008863A1 (en) 2025-01-09

Family

ID=94171399

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/IN2024/050733 WO2025008863A1 (en) 2023-07-03 2024-06-11 Method and system for granting a data traffic access associated with a target network

Country Status (1)

Country Link
WO (1) WO2025008863A1 (en)

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2017177767A1 (en) * 2016-04-14 2017-10-19 大唐移动通信设备有限公司 Service access, and control method and apparatus therefor
CN116074283A (en) * 2021-11-01 2023-05-05 中国移动通信有限公司研究院 Data processing method, device, equipment and storage medium

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2017177767A1 (en) * 2016-04-14 2017-10-19 大唐移动通信设备有限公司 Service access, and control method and apparatus therefor
CN116074283A (en) * 2021-11-01 2023-05-05 中国移动通信有限公司研究院 Data processing method, device, equipment and storage medium

Similar Documents

Publication Publication Date Title
WO2025008863A1 (en) Method and system for granting a data traffic access associated with a target network
WO2025052421A1 (en) Method and system for handling location requests in a wireless communication network
WO2025057186A1 (en) Method and system for managing registration of a network function
WO2025052436A1 (en) Method and system for discovery of one or more peer network functions
WO2025052399A1 (en) Method and system for registering a user equipment
WO2025013048A1 (en) Method and system for updating parameters for one or more network nodes
WO2025052474A1 (en) Method and system for managing subscription of network functions
WO2025052439A1 (en) Method and system for registering a request at a gateway mobile location centre (gmlc)
WO2025008936A1 (en) Method and system for establishing pdu session with upf
WO2025069062A1 (en) Method and system for service continuity in a communication network
WO2025012980A1 (en) Method and system for performing a barring procedure in a pre-defined presence reporting area (pra)
WO2025012927A1 (en) Method and system for managing messages in binding support function bsf unit of communication network
WO2025052478A1 (en) Method and system for generating a pcf response in a telecommunications network
WO2025012937A1 (en) Method and system for retrieving a target subscriber location
WO2025008867A1 (en) Method and system for managing network slice selection in a telecommunications network
WO2025008915A1 (en) Method and system for providing a network slice instance information
WO2025069076A1 (en) Method and system for authenticating a home gateway (hgw) in a broadband network
WO2025052420A1 (en) Method and system for establishing a network session at a binding support function (bsf)
WO2025052402A1 (en) Method and system for managing stale subscriptions
WO2025069061A1 (en) Method and system for subscriber quota management in a network
WO2025069063A1 (en) Method and system for integrating network repository function with a security edge protection proxy
WO2025017686A1 (en) Method and system for provisioning slice information in a communication network
WO2025008990A1 (en) Method and system for authenticating a user equipment (ue)
WO2025017730A1 (en) Method and system for handling non-ip data delivery (nidd) configuration data
WO2025008929A1 (en) Method and system for selecting a domain for terminating a message

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 24835586

Country of ref document: EP

Kind code of ref document: A1