Method and device for organizing and managing function module files

文档序号:72559 发布日期:2021-10-01 浏览:26次 中文

阅读说明:本技术 一种功能模块档案的组织与管理方法及装置 (Method and device for organizing and managing function module files ) 是由 罗张宇 于 2020-03-30 设计创作,主要内容包括:本公开关于一种功能模块档案的组织与管理方法及装置,针对现有技术中由于DF信息缺失或不完整,导致后续出现决策失当、失误的问题,该方法包括:MRF对near-RT RIC中的DF运行状态进行实时监听,MRF监听到待加载的DF被加载到near-RT RIC中时,获取待加载的DF的档案信息,并对档案信息进行安全验证,当MRF确定档案信息通过安全验证时,将档案信息存储至预设的档案库中的指定位置。本公开中,通过MRF对DF的档案信息进行管理,这样,保证了DF的档案信息的即时完整性,便于对档案信息进行实时追踪,从而提高了交互质量与效率,保证了后续决策的有效性、准确性。(The disclosure relates to a method and a device for organizing and managing functional module archives, aiming at the problem that in the prior art, due to the fact that DF information is missing or incomplete, the follow-up decision making is incorrect and wrong, the method comprises the following steps: the method comprises the steps that the MRF monitors the operation state of the DF in the near-RT RIC in real time, when the MRF monitors that the DF to be loaded is loaded into the near-RT RIC, the file information of the DF to be loaded is obtained, the file information is subjected to safety verification, and when the MRF determines that the file information passes the safety verification, the file information is stored to a preset appointed position in a file library. In the disclosure, the file information of the DF is managed through the MRF, so that the instant integrity of the file information of the DF is ensured, and the file information is convenient to track in real time, thereby improving the interaction quality and efficiency and ensuring the effectiveness and accuracy of subsequent decisions.)

1. A method for organizing and managing function module files is characterized by comprising the following steps:

the function module management device MRF monitors the operation state of a defined function DF in a near real-time radio access network intelligent controller near-RT RIC in real time;

when the MRF monitors that any DF to be loaded is loaded into the near-RT RIC, acquiring the archive information of the DF to be loaded, and carrying out security verification on the archive information;

and when the MRF determines that the archive information passes the security verification, storing the archive information to a specified position in a preset archive.

2. The method of claim 1, wherein after the MRF stores the archive information to a designated location in a preset archive, the method further comprises:

when receiving a file information updating request sent by a loaded DF, the MRF acquires file change description information and carries out security verification on the file change description information, wherein the file information updating request at least carries the file change description information and a functional module number;

and when the MRF determines that the archive change description information passes the security verification, updating the archive information of the loaded DF stored in the archive library based on the functional module number and the archive change description information.

3. The method of claim 1, wherein after the MRF stores the archive information to a designated location in a preset archive, the method further comprises:

when receiving a file information query request sent by a loaded DF, the MRF acquires file query information and performs security verification on the file query information, wherein the file information query request at least carries the file query information;

when the MRF determines that the archive inquiry information passes the security verification, matching a corresponding archive inquiry result from the archive library based on the archive inquiry information;

and the MRF sends the archive inquiry result to the loaded DF.

4. The method of claim 1, wherein after the MRF stores the archive information to a designated location in a preset archive, the method further comprises:

and when the MRF monitors that the loaded DF is removed from the near-RT RIC, acquiring the functional module number of the loaded DF, and deleting the archive information of the loaded DF from the archive library based on the functional module number.

5. The method of any one of claims 1 to 4, wherein the MRF interacts with the DF using an interface-based interaction, or wherein the MRF interacts with the DF using an object-oriented interaction, or wherein the MRF interacts with the DF using a function call, wherein the DF comprises the loaded DF and the DF to be loaded.

6. An apparatus for organizing and managing function module files, comprising:

a memory for storing executable instructions;

a processor for reading and executing the executable instructions stored in the memory, performing the following processes:

monitoring the operation state of a defined function DF in a near-real-time radio access network intelligent controller near-RT RIC in real time;

when monitoring that any DF to be loaded is loaded into the near-RT RIC, acquiring the archive information of the DF to be loaded, and carrying out security verification on the archive information;

and when the archive information is confirmed to pass the security verification, storing the archive information to a specified position in a preset archive.

7. The apparatus of claim 6, wherein after storing the archive information to a specified location in a pre-defined archive, the processor is further configured to:

when receiving a file information updating request sent by a loaded DF, acquiring file change description information and carrying out security verification on the file change description information, wherein the file information updating request at least carries the file change description information and a functional module number;

and updating the archive information of the loaded DF stored in the archive library based on the functional module number and the archive change description information when the archive change description information is determined to pass the security verification.

8. The apparatus of claim 6, wherein after storing the archive information to a specified location in a pre-defined archive, the processor is further configured to:

when a file information query request sent by a loaded DF is received, obtaining file query information and carrying out security verification on the file query information, wherein the file information query request at least carries the file query information;

when the archive inquiry information is confirmed to pass the security verification, matching a corresponding archive inquiry result from the archive library based on the archive inquiry information;

and sending the archive inquiry result to the loaded DF.

9. The apparatus of claim 6, wherein after storing the archive information to a specified location in a pre-defined archive, the processor is further configured to:

and when monitoring that the loaded DF is removed from the near-RT RIC, acquiring the function module number of the loaded DF, and deleting the archive information of the loaded DF from the archive library based on the function module number.

10. The apparatus of any one of claims 6 to 9, wherein the DF comprises a loaded DF and a DF to be loaded, using an interface-based interaction, or an object-oriented interaction, with the DF, or a function call.

11. An apparatus for organizing and managing function module files, comprising:

the monitoring unit is used for monitoring the operation state of a defined function DF in a near-real-time radio access network intelligent controller near-RT RIC in real time;

the processing unit is used for monitoring that when any DF to be loaded is loaded into the near-RT RIC, acquiring the archive information of the DF to be loaded and carrying out security verification on the archive information;

and the storage unit is used for storing the archive information to a specified position in a preset archive library when the archive information passes the security verification.

12. A storage medium, wherein instructions in the storage medium, when executed by a processor, enable the processor to perform the method for organizing and managing a function module archive according to any one of claims 1 to 5.

Technical Field

The present disclosure relates to the field of communications technologies, and in particular, to a method and an apparatus for organizing and managing function module files.

Background

In a near real time radio access network controller (near-RT RIC) of an Open radio access network (Open RAN, O-RAN), there are several basic functions, such as a security function, a collision management function, an application function, and the like. The above-mentioned basic functions and other future newly Defined extended functions, each responsible for a certain part of near-RT RIC information flow processing, will be referred to as Defined Functions (DF) hereinafter.

In the prior art, DF is identified by near-RT RIC, and then is kept in a stable state within a certain period, and DF information is not changed any more.

However, in actual operation, any of, but not limited to, the following may occur:

in the first case: the appearance of the newly defined DF in near-RT RIC;

in the second case: changes occur to the defined DF, e.g., merging, splitting, etc.;

in the third case: near-RT RIC uses DF from third party sources.

Obviously, the problems of incapability of completing processing, decision making errors and the like may be caused by the problems of incapability of acquiring the DF information, incompleteness of the DF information and the like.

Taking an application program (xAPP) as an example, xAPP is a functional component which changes faster in near-RT RIC, and has the characteristics of large quantity and fast iteration under the influence of factors such as continuous development of an intelligent method, continuous refinement of parameter collection granularity, hardware upgrade, manufacturer competition and the like, in this case, a unit which interacts with xAPP is required, and all xAPP information is probably unable to be mastered, and the loss of xAPP information may cause problems such as decision errors, misjudgment, incapability of completing processing and the like.

It follows that a new solution needs to be devised to overcome the above drawbacks.

Disclosure of Invention

The present disclosure provides a method and a device for organizing and managing function module files, which are used to solve the problem of subsequent misdecision and error caused by the absence or incompleteness of DF information in the prior art.

The specific technical scheme provided by the embodiment of the disclosure is as follows:

a method for organizing and managing function module files comprises the following steps:

the function module management device MRF monitors the DF running state in near-RT RIC in real time;

when the MRF monitors that any DF to be loaded is loaded into the near-RT RIC, acquiring the archive information of the DF to be loaded, and carrying out security verification on the archive information;

and when the MRF determines that the archive information passes the security verification, storing the archive information to a specified position in a preset archive.

Optionally, after the MRF stores the archive information to a specified location in a preset archive, the method further includes:

when receiving a file information updating request sent by a loaded DF, the MRF acquires file change description information and carries out security verification on the file change description information, wherein the file information updating request at least carries the file change description information and a functional module number;

and when the MRF determines that the archive change description information passes the security verification, updating the archive information of the loaded DF stored in the archive library based on the functional module number and the archive change description information.

Optionally, after the MRF stores the archive information to a specified location in a preset archive, the method further includes:

when receiving a file information query request sent by a loaded DF, the MRF acquires file query information and performs security verification on the file query information, wherein the file information query request at least carries the file query information;

when the MRF determines that the archive inquiry information passes the security verification, matching a corresponding archive inquiry result from the archive library based on the archive inquiry information;

and the MRF sends the archive inquiry result to the loaded DF.

Optionally, after the MRF stores the archive information to a specified location in a preset archive, the method further includes:

and when the MRF monitors that the loaded DF is removed from the near-RT RIC, acquiring the functional module number of the loaded DF, and deleting the archive information of the loaded DF from the archive library based on the functional module number.

Optionally, the MRF interacts with the DF in an interface-based interaction manner, or the MRF interacts with the DF in an object-oriented interaction manner, or the MRF interacts with the DF in a function call manner, where the DF includes the loaded DF and the DF to be loaded.

An organization and management device for function module files, comprising:

a memory for storing executable instructions;

a processor for reading and executing the executable instructions stored in the memory, performing the following processes:

monitoring the operation state of a defined function DF in a near-real-time radio access network intelligent controller near-RT RIC in real time;

when monitoring that any DF to be loaded is loaded into the near-RT RIC, acquiring the archive information of the DF to be loaded, and carrying out security verification on the archive information;

and when the archive information is confirmed to pass the security verification, storing the archive information to a specified position in a preset archive.

Optionally, after storing the archive information to a specified location in a preset archive, the processor is further configured to:

when receiving a file information updating request sent by a loaded DF, acquiring file change description information and carrying out security verification on the file change description information, wherein the file information updating request at least carries the file change description information and a functional module number;

and updating the archive information of the loaded DF stored in the archive library based on the functional module number and the archive change description information when the archive change description information is determined to pass the security verification.

Optionally, after storing the archive information to a specified location in a preset archive, the processor is further configured to:

when a file information query request sent by a loaded DF is received, obtaining file query information and carrying out security verification on the file query information, wherein the file information query request at least carries the file query information;

when the archive inquiry information is confirmed to pass the security verification, matching a corresponding archive inquiry result from the archive library based on the archive inquiry information;

and sending the archive inquiry result to the loaded DF.

Optionally, after storing the archive information to a specified location in a preset archive, the processor is further configured to:

and when monitoring that the loaded DF is removed from the near-RT RIC, acquiring the function module number of the loaded DF, and deleting the archive information of the loaded DF from the archive library based on the function module number.

Optionally, an interface-based interaction mode is adopted to interact with the DF, or an object-oriented interaction mode is adopted to interact with the DF, or a function call mode is adopted to interact with the DF, where the DF includes a loaded DF and a DF to be loaded.

An organization and management device for function module files, comprising:

the monitoring unit is used for monitoring the operation state of a defined function DF in a near-real-time radio access network intelligent controller near-RT RIC in real time;

the processing unit is used for monitoring that when any DF to be loaded is loaded into the near-RT RIC, acquiring the archive information of the DF to be loaded and carrying out security verification on the archive information;

and the storage unit is used for storing the archive information to a specified position in a preset archive library when the archive information passes the security verification.

A storage medium, wherein instructions of the storage medium, when executed by a processor, enable the processor to execute the method for organizing and managing a functional module archive as described in any one of the above.

In the embodiment of the disclosure, the MRF monitors the running state of the DF in the near-RT RIC in real time, and when the MRF monitors that any DF to be loaded is loaded into the near-RT RIC, the MRF obtains the archive information of any DF to be loaded, and performs security verification on the archive information, and then when the MRF determines that the archive information passes the security verification, the MRF stores the archive information to a specified position in a preset archive library. Therefore, the file information of the DF is managed through the MRF, the instant integrity of the file information of the DF is guaranteed, the file information is convenient to track in real time, the interaction quality and efficiency are improved, and the effectiveness and accuracy of follow-up decision making are guaranteed.

Drawings

In order to more clearly illustrate the embodiments of the present disclosure or the technical solutions in the prior art, the drawings used in the description of the embodiments or the prior art will be briefly described below, it is obvious that the drawings in the following description are only some embodiments of the present invention, and other drawings can be obtained by those skilled in the art without creative efforts.

Fig. 1 is a schematic flow chart of new archive information provided in an embodiment of the present disclosure;

FIG. 2 is a schematic flow chart illustrating updating of file information according to an embodiment of the disclosure;

fig. 3 is a schematic flow chart illustrating a process of querying archive information according to an embodiment of the disclosure;

fig. 4 is a schematic flow chart illustrating deletion of archive information according to an embodiment of the disclosure;

FIG. 5 is a schematic structural diagram illustrating an apparatus for organizing and managing function module files according to an embodiment of the present disclosure;

fig. 6 is a schematic structural diagram of another functional module file organizing and managing apparatus provided in the embodiment of the disclosure.

Detailed Description

In order to perform standardized management on DF, in the embodiments of the present disclosure, a solution for organizing and managing function module files is provided for solving the problem of subsequent decision misappropriation and errors caused by missing or incomplete DF information in the prior art.

The scheme is as follows: a Function Module management device (MRF) monitors the DF running state in near-RT RIC in real time; when the MRF monitors that any DF to be loaded is loaded into the near-RT RIC, acquiring the archive information of any DF to be loaded, and carrying out security verification on the archive information; and when the MRF determines that the archive information passes the security verification, storing the archive information to a specified position in a preset archive.

It should be noted that in the embodiment of the present disclosure, the MRF may be deployed alone or in combination with other modules. For convenience of description, the MRF is only deployed alone as an example in the following.

In order to make the technical solutions of the present disclosure better understood by those of ordinary skill in the art, the technical solutions in the embodiments of the present disclosure will be clearly and completely described below with reference to the accompanying drawings.

Referring to fig. 1, in the embodiment of the present disclosure, when organizing and managing the function module files, a new process of file information is as follows:

step S101: and the MRF monitors the DF running state in near-RT RIC in real time.

It should be noted that, in the embodiment of the present disclosure, according to the operation state of the DF, the DF in the near-RT RIC may be divided into a loaded DF and a DF to be loaded, where the DF to be loaded may be a DF newly defined in the near-RT RIC or a DF provided by a third party, and the present disclosure is not limited thereto.

For example, in near-RT RIC, the loaded DF includes DF1, DF2, the DF to be loaded includes DFX, and the MRF monitors the operating states of DF1, DF2, DFX in real time.

Step S102: when the MRF monitors that any DF to be loaded is loaded into the near-RT RIC, the file information of any DF to be loaded is obtained, and the security verification is carried out on the file information.

Specifically, when receiving an archive information new request sent by any DF to be loaded, the MRF determines to monitor that any DF to be loaded is loaded into the near-RT RIC.

For example, when the MRF receives a new request for profile information sent by the DFX, it determines to monitor that the DFX is loaded into the near-RT RIC.

Further, the MRF obtains the archive information of any DF to be loaded from the archive information new request of any DF to be loaded.

In the embodiment of the present disclosure, referring to table 1, the archive information carried in the archive information new request at least includes a standard name of a function module, a serial number of the function module, and function module performance information, where the function module performance information at least includes, but is not limited to, the following information: the system comprises a function module manufacturer, a function module version, system requirements, function module input, capability output information and capability intermediate processing information, wherein N represents any positive integer, and the number of the function module is initially registered as 0X0000 (hexadecimal).

TABLE 1 archive information New request

Information element List of Number of Description of the invention
Standard name of module Must choose 1 Standard name used to characterize DF.
Function module numbering Must choose 1 Number used to characterize DF.
Manufacturer of functional modules Must choose 1 Manufacturer for characterization of DF.
Function module version Must choose 1 For characterizing the version of DF.
System requirements Must choose 1 For characterizing the operating system requirements of the DF.
Functional module input Must choose 1...N Input used to characterize DF.
Capability output information Must choose 1...N For characterizing the information that the DF is capable of outputting.
Capability mediation information Must choose 1...N Information characterizing the ability of the DF to mediate processing.
Size of functional module Optionally 0...1 Software size for characterizing DF.

For example, the MRF obtains profile information of the DFX from a profile information new creation request of the DFX, where a module standard name of the DFX is HO-Decision-Maker @ IMSI is 46001123456789, the module standard name characterizes that the module performs a handover Decision for a user whose International Mobile Subscriber Identity (IMSI) is 46001123456789, a function module number of the DFX is 0X0000 (hexadecimal), a function module manufacturer of the DFX characterizes that the DFX is produced by china information communication technology group limited (CICT), a function module version of the DFX is 1.0.0.1, a system requirement of the DFX is Read-Only Memory (ROM) is not less than 100 Megabits (MB), a function module input of the dfortx is Measurement-Report @ IMSI 34, the function module input of the function module 46001123456789 characterizes a Measurement Report of the user whose IMSI is 46001123456789, capability output information of the DFX is HO-Decision @ IMSI, and the capability output of the module is HO-59 460010123456789, the capability information of the DFX characterizes a handover command IMSI 46001123456789, the DFX capability intermediate processing information is HO-Decision-Maker-Log @ IMSI of [email protected] UTC20251012, and the capability intermediate processing information represents a processing Log of the DFX at 10, month and 12 days of 2025.

Further, after the MRF obtains the archive information of any DF to be loaded, the MRF performs security verification on the archive information.

It should be noted that in the embodiments of the present disclosure, the security verification includes, but is not limited to, authenticity verification, integrity verification, confidentiality verification, and the like.

For example, after the MRF acquires the profile information of the DFX, the MRF performs authenticity verification and integrity verification on the profile information of the DFX.

Step S103: and when the MRF determines that the archive information passes the security verification, storing the archive information to a specified position in a preset archive.

For example, when the MRF determines that the profile information of the DFX passes the security verification, the MRF stores the profile information of the DFX to a designated location in a preset profile library.

In the embodiment of the present disclosure, since the standard name of the module is too long, in order to improve the interaction efficiency between the MRF and the DFs, after the MRF stores the archive information to the designated location in the preset archive, the MRF may assign a new functional module number to any new DF, and update the functional module number stored in the designated location, where the new functional module number is used as the unique identifier of the DF during subsequent interaction.

For example, after the MRF stores the profile information of the DFX to a designated location in a preset profile library, a new function module number 0XF00D (hexadecimal) is assigned to the DFX, and the function module number stored in the designated location is updated, and the updated function module number is 0XF00D (hexadecimal).

It should be noted that, in the embodiment of the present disclosure, a standard name of a functional module may also be directly used as the unique identifier of the DF during subsequent interaction, which is not limited in the present disclosure and is not described herein again.

Further, the MRF sends an archive information new establishment response to any DF to be loaded, and the archive information new establishment response at least carries a function module number, a response code and a description.

For example, referring to table 2, the MRF sends a profile information new creation response to the DFX, where the profile information new creation response carries the function module number 0XF00D (hexadecimal), and the response code and description 200 (success) indicating a successful response.

TABLE 2 archive information New response

Information element List of Number of Description of the invention
Response code and description Must choose 1 Indicating whether the response was successful.
Error prompt The conditions are selectable 0…1 Used for indicating the error reason and sent when the response fails.
Function module numbering The conditions are selectable 0…1 The number used to characterize the DF is sent when the response is successful.

After step S103, all the file information of the DFX is stored in the preset file library and managed by the MRF, so that the DFX becomes a loaded DF.

Next, the following cases will be described by taking DFX as an example.

In the first case: and updating the file information of the loaded DF.

Referring to fig. 2, in the embodiment of the present disclosure, the update process of the file information is as follows:

step S201: and when receiving the file information updating request sent by the loaded DF, the MRF acquires the file change description information and carries out security verification on the file change description information.

In the embodiment of the present disclosure, the archive information update request at least carries archive change description information and a function module number.

It should be noted that in the embodiments of the present disclosure, the security verification includes, but is not limited to, authenticity verification, integrity verification, confidentiality verification, and the like.

For example, as shown in table 3, when receiving a file information update request from the DFX, the MRF acquires file change description information, where the file change description information includes output information and readable information, where the responsibility output information is HO-preference @ IMSI ═ 460010123456789, the responsibility output information indicates that the handover of the user with IMSI 46001123456789 is prepared in advance, the readable information is Last-30-Days-route @ IMSI 460010123456789, the readable information indicates a moving track of the user with IMSI 46001123456789 in the Last thirty Days, and then, the MRF performs security verification on the file change description information.

TABLE 3 archive information update request and archive information update response

Step S202: and when the MRF determines that the archive change description information passes the security verification, updating the archive information of the loaded DF stored in the archive library based on the functional module number and the archive change description information.

For example, when the MRF determines that the profile change description information passes the security authentication, the profile information stored in the designated location is updated based on the function module number 0XF00D (hexadecimal) and the profile change description information.

Step S203: the MRF sends an archive information update response to the loaded DF.

In the embodiment of the disclosure, the file information update response at least carries a response code and a description.

For example, referring to table 3, the MRF sends an archive information update response to the DFX, where the archive information update response carries a response code and description 200 (success) that characterizes a successful response.

In the second case: and inquiring the archive information of the loaded DF.

Referring to fig. 3, in the embodiment of the present disclosure, the query process of the file information is as follows:

step S301: and when receiving the file information query request sent by the loaded DF, the MRF acquires the file query information and carries out security verification on the file query information.

In the embodiment of the present disclosure, as shown in table 4, the archive information query request at least carries archive query information, where the archive query information includes, but is not limited to, any one or any combination of capability output information, capability intermediate processing information, and responsibility output information.

It should be noted that, in the embodiment of the present disclosure, in order to implement a quick query, a subscription requirement is introduced, and the subscription requirement is used to implement a subscription query, and parameters included in the subscription requirement are shown in table 5, where effective values of a subscription type include, but are not limited to, new subscription, update subscription, and delete subscription, time included in a subscription start time and a subscription end time may be given in, but is not limited to, a year-month-day-hour-minute-second (yyyyyyyyy-MM-DD-HH-MI-SS) time format, and a subscription end time is required to be after the subscription start time by default.

It should be noted that in the embodiments of the present disclosure, the security verification includes, but is not limited to, authenticity verification, integrity verification, confidentiality verification, and the like.

For example, when receiving a profile information query request of the DFX, the MRF obtains profile query information, where the profile query information includes capability output information and subscription requirements, where parameters included in the subscription requirements are a subscription type characterizing a new subscription and a subscription end time characterizing 2020-10-10-13-20-20, and then, the MRF performs security verification on the profile query information.

TABLE 4 archive information query request and archive information query response

TABLE 5 parameter List of subscription requirements

Step S302: and when the MRF determines that the archive inquiry information passes the security verification, matching a corresponding archive inquiry result from the archive library based on the archive inquiry information.

For example, when the MRF determines that the archive query information of the DFX passes the security verification, a corresponding archive query result is matched from the archive repository based on the archive query information, and at this time, the archive query result is a capability output query result indicating that the DF capable of providing the corresponding output is DF 1.

Step S303: the MRF sends the archive query result to the loaded DF.

Specifically, the MRF sends an archive information query response to the loaded DF, where the archive information query response at least carries an archive query result, a response code, and a description.

For example, referring to table 4, the MRF sends an archive information query response to the DFX, where the archive information query response carries at least the archive query result characterizing DF1, and the response code and description 200 (success).

In the third case: and deleting the archive information of the loaded DF.

Referring to fig. 4, in the embodiment of the present disclosure, the deletion process of the file information is as follows:

step S401: and when the MRF monitors that the loaded DF is removed from the near-RT RIC, the MRF acquires the functional module number of the loaded DF, and deletes the archive information from the specified position based on the functional module number.

Specifically, when receiving an archive information deletion request sent by a loaded DF, the MRF determines to monitor that the loaded DF is removed from the near-RT RIC.

For example, when receiving a profile information deletion request sent by the DFX, the MRF determines to monitor the removal of the DFX from the near-RT RIC.

Further, the MRF acquires the function module number of the loaded DF from the archive information deletion request of the loaded DF, and deletes the archive information of the loaded DF from the archive based on the function module number.

In the embodiment of the present disclosure, as shown in table 6, the file information deleting request at least carries a function module number.

For example, the MRF acquires the function module number 0XF00D (hexadecimal) of the DFX from the archive information deletion request transmitted from the DFX, and deletes the archive information of the DFX from the archive based on the function module number 0XF00D (hexadecimal).

TABLE 6 archive information delete request and archive information delete response

Step S402: the MRF sends an archive information deletion response to the loaded DF.

In the embodiment of the disclosure, the archive information deletion response at least carries a response code and a description.

For example, the MRF sends a file delete response to the DFX, where the file delete response carries the response code and description 200 (success).

It should be noted that, in the embodiment of the present disclosure, during the process of creating, updating, querying, and deleting the archive information, when the MRF and the DF interact, the following methods may be adopted, but are not limited to:

the first mode is as follows: and the MRF adopts an interface-based interaction mode to interact with the DF interface.

For example, the MRF interacts with the DF interface in a format similar to the S1 interface, and in this case, the information elements in table 1, table 2, table 3, table 4, and table 6 are directly transmitted in parallel.

The second mode is as follows: and the MRF adopts an object-oriented interaction mode to interact with the DF interface.

In the embodiment of the present disclosure, referring to table 7, the object-oriented interaction manner refers to performing interaction based on an object and a related operation for the object.

For example, taking the new creation process as an example, referring to tables 7 to 10, the information elements in the archive information new request, archive information new response, archive information update request, archive information update response, archive information query request, archive information query response, archive information delete request, and archive information delete response are classified into four types: the module object at least comprises parameters such as a module standard name, a function module number, a function module manufacturer, a function module version, system requirements, function module input, capability output information, capability intermediate processing information, function module size, responsibility output information, readable information and the like, the parameters contained in the response object parameter, the subscription information object and the query result object refer to tables 7-10, the operation aiming at the objects comprises building an object, updating an object, querying an object and deleting an object, and the MRF interacts with the DFX based on the module object, the response object, the subscription information object, the query result object and corresponding operation.

TABLE 7 archive information New request and archive information New response

TABLE 8 archive information update request and archive information update response

TABLE 9 archive information query request and archive information query response

TABLE 10 archive information delete request and archive information delete response

The third mode is as follows: and the MRF interacts with the loaded DF in a function calling mode.

For example, taking the new creation process of the file information as an example, referring to table 1 and table 2, the MRF receives the information element in the file information new creation request shown in table 1 sent by the DFX by using a function call method, and then sends the information element in the file information new creation response shown in table 2 to the DFX by using the function call method.

In other disclosed embodiments, if the MRF fails to respond successfully during the new creation, update, query, and deletion, the error cause is determined, and an error prompt representing the error cause, a response code representing the failure in response, and a description are sent to the corresponding DF.

For example, taking the new creation process as an example, if the MRF fails to respond, it is determined that the error reason is that the functional module input has a syntax error, and the MRF sends an error prompt indicating that the functional module input has the syntax error and a response code and description indicating that the response fails to the DFX, where the response code and description are 300 (input of failed and invalid functional modules).

In other disclosed embodiments, in the updating, querying and deleting processes, when the MRF receives a request sent by a loaded DF, the MRF performs authentication on the loaded DF according to the identity information of the loaded DF carried in the request and the pre-stored authority information, and executes subsequent operations when it is determined that the loaded DF passes the authentication.

For example, taking an update process as an example, when receiving a file information update request sent by a DFX, an MRF performs identity verification on a loaded DF according to a function module number of the DFX and pre-stored authority information carried in the file information update request, and when determining that the DFX passes the identity verification, acquires file change description information of the DFX and performs security verification on the file change description information, and when determining that the file change description information passes the security verification, the MRF updates the file information of the DFX stored in a file repository based on the function module number of the DFX and the file change description information.

Based on the same inventive concept, in the embodiments of the present disclosure, an apparatus for organizing and managing function module files is provided, as shown in fig. 5, the apparatus at least includes:

a memory 501 for storing executable instructions;

a processor 502 for reading and executing executable instructions stored in the memory, and performing the following processes:

monitoring the DF running state in near-RT RIC in real time;

when monitoring that any DF to be loaded is loaded into the near-RT RIC, acquiring the archive information of the DF to be loaded, and carrying out security verification on the archive information;

and when the archive information is confirmed to pass the security verification, storing the archive information to a specified position in a preset archive.

Optionally, after storing the archive information to a specified location in a preset archive, the processor 502 is further configured to:

when receiving a file information updating request sent by a loaded DF, acquiring file change description information and carrying out security verification on the file change description information, wherein the file information updating request at least carries the file change description information and a functional module number;

and updating the archive information of the loaded DF stored in the archive library based on the functional module number and the archive change description information when the archive change description information is determined to pass the security verification.

Optionally, after storing the archive information to a specified location in a preset archive, the processor 502 is further configured to:

when a file information query request sent by a loaded DF is received, obtaining file query information and carrying out security verification on the file query information, wherein the file information query request at least carries the file query information;

when the archive inquiry information is confirmed to pass the security verification, matching a corresponding archive inquiry result from the archive library based on the archive inquiry information;

and sending the archive inquiry result to the loaded DF.

Optionally, after storing the archive information to a specified location in a preset archive, the processor 502 is further configured to:

and when monitoring that the loaded DF is removed from the near-RT RIC, acquiring the function module number of the loaded DF, and deleting the archive information of the loaded DF from the archive library based on the function module number.

Optionally, an interface-based interaction mode is adopted to interact with the DF, or an object-oriented interaction mode is adopted to interact with the DF, or a function call mode is adopted to interact with the DF, where the DF includes a loaded DF and a DF to be loaded.

A transceiver 503 for receiving and transmitting data under the control of the processor 502.

Where in fig. 5 the bus architecture may include any number of interconnected buses and bridges, in particular one or more processors represented by processor 502 and various circuits of memory represented by memory 501 are linked together. The bus architecture may also link together various other circuits such as peripherals, voltage regulators, power management circuits, and the like, which are well known in the art, and therefore, will not be described any further herein. Bus interface 504 provides an interface. The transceiver 503 may be a number of elements, including a transmitter and a transceiver, providing a means for communicating with various other apparatus over a transmission medium. The processor 502 is responsible for managing the bus architecture and general processing, and the memory 501 may store data used by the processor 502 in performing operations.

Based on the same inventive concept, in the embodiments of the present disclosure, an apparatus for organizing and managing function module files is provided, as shown in fig. 6, the apparatus at least includes: a listening unit 601, a processing unit 602, and a storage unit 603, wherein,

the monitoring unit 601 is used for monitoring the DF running state in near-RT RIC in real time;

the processing unit 602 is configured to, when monitoring that any DF to be loaded is loaded into the near-RT RIC, obtain archive information of the DF to be loaded, and perform security verification on the archive information;

the storage unit 603 is configured to store the archive information to a specified location in a preset archive when it is determined that the archive information passes the security verification.

The listening unit 601, the processing unit 602 and the storage unit 603 cooperate with each other to implement the functions of the functional module file organizing and managing apparatus in the above-mentioned embodiments.

Based on the same inventive concept, the embodiments of the present disclosure provide a storage medium, and when instructions in the storage medium are executed by a processor, the processor can execute any method implemented by the apparatus for organizing and managing function module files in the above process.

In the embodiment of the disclosure, the MRF monitors the running state of the DF in the near-RT RIC in real time, and when the MRF monitors that any DF to be loaded is loaded into the near-RT RIC, the MRF obtains the archive information of any DF to be loaded, and performs security verification on the archive information, and then when the MRF determines that the archive information passes the security verification, the MRF stores the archive information to a specified position in a preset archive library. Like this, manage the archival information of DF through MRF, guaranteed the instant integrality of the archival information of DF, be convenient for track archival information in real time, thereby interactive quality and efficiency have been improved, the validity of follow-up decision-making, the accuracy has been guaranteed, in addition, because MRF just can save archival information when archival information passes through safety verification, consequently, the information security of archives has been guaranteed, the potential safety hazard that illegal operation brought has been avoided, thereby communication system's factor of safety has been improved.

For the system/apparatus embodiments, since they are substantially similar to the method embodiments, the description is relatively simple, and reference may be made to some descriptions of the method embodiments for relevant points.

It is to be noted that, in this document, relational terms such as first and second, and the like are used solely to distinguish one entity or operation from another entity or operation without necessarily requiring or implying any actual such relationship or order between such entities or operations.

As will be appreciated by one skilled in the art, embodiments of the present disclosure may be provided as a method, system, or computer program product. Accordingly, the present disclosure may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects. Furthermore, the present disclosure may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, and so forth) having computer-usable program code embodied therein.

The present disclosure is described with reference to flowchart illustrations and/or block diagrams of methods, apparatus (systems), and computer program products according to embodiments of the disclosure. It will be understood that each flow and/or block of the flow diagrams and/or block diagrams, and combinations of flows and/or blocks in the flow diagrams and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, embedded processor, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.

These computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable data processing apparatus to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including instruction means which implement the function specified in the flowchart flow or flows and/or block diagram block or blocks.

These computer program instructions may also be loaded onto a computer or other programmable data processing apparatus to cause a series of operational steps to be performed on the computer or other programmable apparatus to produce a computer implemented process such that the instructions which execute on the computer or other programmable apparatus provide steps for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.

While preferred embodiments of the present disclosure have been described, additional variations and modifications in those embodiments may occur to those skilled in the art once they learn of the basic inventive concepts. Therefore, it is intended that the appended claims be interpreted as including preferred embodiments and all alterations and modifications as fall within the scope of the disclosure.

It will be apparent to those skilled in the art that various changes and modifications can be made in the present disclosure without departing from the spirit and scope of the disclosure. Thus, if such modifications and variations of the present disclosure fall within the scope of the claims of the present disclosure and their equivalents, the present disclosure is intended to include such modifications and variations as well.

20页详细技术资料下载
上一篇:一种医用注射器针头装配设备
下一篇:故障检测方法、系统、装置、服务器及存储介质

网友询问留言

已有0条留言

还没有人留言评论。精彩留言会获得点赞!

精彩留言,会给你点赞!