Strategy operation, configuration issuing, conflict resolution and closed-loop management method and system

A technology for policy configuration and conflict handling, applied in the field of communication and information, it can solve the problems of high complexity of data management, user loss, user complaints, etc., to achieve the effect of safe configuration and use of policies, good user experience, and cost reduction

Inactive Publication Date: 2015-11-18
ZTE CORP
View PDF3 Cites 22 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] There may be policy conflicts for the same user to sign up for multiple policies. If it is not handled properly, it may easily cause user complaints or even user loss. In order to really improve user experience, how to detect and manage policy conflicts, and is policy deployment safe enough?
[0006] The configuration and maintenance of core network equipment from different manufacturers are not uniform, and the policy configuration and policy contract data management work is very complicated. How to get rid of the situation of inefficient manual processing?
[0007] Policy lifecycle management is complex, involving many departments and processes. How to coordinate the orderly and efficient work of resources in all aspects?

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Strategy operation, configuration issuing, conflict resolution and closed-loop management method and system
  • Strategy operation, configuration issuing, conflict resolution and closed-loop management method and system
  • Strategy operation, configuration issuing, conflict resolution and closed-loop management method and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0079] This embodiment provides a policy conflict handling method, such as figure 1 shown, including:

[0080] Step 110, acquiring the policy user group of the newly configured policy;

[0081] For example, the new configuration policy may be a newly configured policy related to network traffic.

[0082] Step 120, for a user in the policy user group who has subscribed to multiple policies, determine whether there is a policy conflict between the new configuration policy and other policies ordered by the user, if yes, perform step 130, otherwise end;

[0083] In this step, whether there is a policy conflict can be determined one by one for users in the policy user group. However, in order to realize rapid processing of policy conflicts, this embodiment adopts the following grouping method to determine whether there is a policy conflict between other policies ordered by users in the policy user group and the new configuration policy:

[0084] Grouping users who have subscribe...

Embodiment 2

[0165] This embodiment provides a method for delivering policy configuration, such as image 3 shown, including:

[0166] Step 210, the device for issuing policy configuration performs policy configuration according to the policy data item;

[0167] Policy data items need to be collected during policy configuration, and policy data items can be obtained in one or more of the following ways:

[0168] Obtained from the data analysis system:

[0169] Obtained from the business acceptance system;

[0170] Obtained through the administrator interface.

[0171] Policy configuration includes configuring the user policy order relationship between the collected policy user groups and policies; creating policy rules, and configuring trigger conditions and output actions for each policy rule.

[0172] In this embodiment, the policy configuration may be a network traffic-related policy configuration.

[0173] In this embodiment, after the policy configuration of the newly added polic...

Embodiment 3

[0231] The policy operation method provided in this embodiment is applied to the policy operation system 1, such as Figure 5 As shown, the peripheral modules associated with the policy operation system include: a data analysis system 105, a business acceptance system 106, and a policy execution system 108. The administrator 104 can input instructions to the policy operation system 1 through the administrator interface, and the terminal user 107 can interact with the business The acceptance system 106 interacts. The policy operation system 1 can interact with the data analysis system 105 and the business acceptance system 106 through standard or proprietary interfaces.

[0232] in:

[0233] The administrator 104 is the initiator, approver and manager of policies in the policy operation system

[0234] The data analysis system 105 provides data support for the strategic operation system. In one embodiment, the data analysis system can be a system with data collection and anal...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a strategy operation, configuration issuing, conflict resolution and closed-loop management method and system. The method comprises the following steps: when a strategy is newly increased in a strategy operation system, examining and approving the newly increased strategy; after passing the examination and approval, performing configuration and submission on the newly increased strategy, wherein the submission is realized through a standard configuration submission interface between the strategy operation system and a strategy execution system; monitoring a running state of the submitted strategy, and displaying the statistical analysis data executed by the submitted strategy. During the configuration process, the strategy conflict resolution can be performed, and after submission, the closed-loop management of the strategy can be performed. The scheme of the invention can enable operators to expand a strategy operation mode, configure and use strategies quickly, conveniently and safely, reduce the production cost of enterprises and enable end users to have a better user experience.

Description

technical field [0001] The present invention relates to the field of communication and information, and more specifically, to a strategy-related method and system. Background technique [0002] In the PCC architecture standard of 3GPP, the policy network implementation capability in the core network category is defined, that is, the policy enforcement system, which includes the policy and charging rule functional unit (PCRF: Policy and Charging Rules Function), user attribute storage (SPR: Subscriber Profile Repository), policy and accounting Core network elements such as Policy and Charging Enforcement Function (PCEF: Policy and Charging Enforcement Function) and evolved Node B (eNodeB). [0003] The current standard does not define network elements related to operational services such as policy configuration delivery. For a long time, different manufacturers have carried out policy management from different perspectives, and their policy management focuses on policy confi...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L12/24
CPCH04L41/50H04L41/507H04L41/00
Inventor 郑兴友
Owner ZTE CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products