EP-4736569-A1 - SYSTEM AND METHOD FOR POLICY RULE CHANGE IN A COMMUNICATION NETWORK
Abstract
The present disclosure a method (500) for changing policy rules in a communication network (106) The method (500) comprising receiving (502) a request from a user equipment (UE) (102). The method comprising extracting (504) a plurality of parameters associated with the received request to generate a list of policy rules. The method comprising provisioning (506) at least one mutual exclusive flag for each policy rule in the generated list of policy rules and pushing (508) a policy rule to a session management function (SMF) (110) after determining that the provisioned mutual exclusive flag is true for the policy rule.
Inventors
- BHATNAGAR, AAYUSH
- Shetty, Mukta
- Jha, Alok
- KUMAR, SANJEEV
- ANJALI, Kunuguntla
- NARAYAN, Gaurav
- Jadhav, Sayali
Assignees
- Jio Platforms Limited
Dates
- Publication Date
- 20260506
- Application Date
- 20240606
Claims (20)
- 1. A system (114) for changing policy rules in a communication network (106), the system (114) comprising: a receiving unit (202) configured for receiving a request from a user equipment (UE) (102); a database (210) configured for storing the request; a processing unit (208) coupled with the receiving unit (202) and the database (210) and configured for receiving the request from the database (210); the processing unit (208) is configured for: extracting a plurality of parameters associated with the received request to generate a list of policy rules; provisioning a mutual exclusive flag for each policy rule in the generated list of policy rules; and pushing a policy rule to a session management function (SMF) (110) after determining that the provisioned mutual exclusive flag is true for the policy rule.
- 2. The system (114) as claimed in claim 1, further configured to establish a SMF session for the policy rule on receiving the request.
- 3. The system (114) as claimed in claim 1 , wherein the plurality of parameters includes one or more of a rule name, an assumption, and an action.
- 4. The system (114) as claimed in claim 3, wherein the rule name and the assumption form a condition associated with the policy rule.
- 5. The system (114) as claimed in claim 4, wherein the action is executed when the condition is met for the policy rule.
- 6. The system (114) as claimed in claim 2, wherein the request includes an addition, a removal, or an updation of a policy rule in a policy rule engine (214).
- 7. The system (114) as claimed in claim 6, wherein the removal of the policy rule is communicated from a policy control function (PCF) (112) to the SMF (110) when the policy rule is successfully installed for a subscriber in the SMF session.
- 8. The system (114) as claimed in claim 1, wherein a precedence for each policy rule in the list of policy rules is defined by a user.
- 9. The system (114) as claimed in claim 7, wherein the PCF (112) is configured to remove an installed policy rule when the condition associated with the installed policy rule is not met, wherein the condition associated with the policy rule is formed based on the rule name and the assumption.
- 10. The system (114) as claimed in claim 6, wherein the policy rule engine (214) is configured to evaluate a set of policies with the plurality of parameters associated with the request during the SMF session.
- 11. The system (114) as claimed in claim 10, wherein the policy rule engine (214) is configured to evaluate at least two policies having similar matching conditions.
- 12. A method (500) for changing policy rules in a communication network (106), the method (500) comprising: receiving (502) a request from a user equipment (UE) (102); extracting (504) a plurality of parameters associated with the received request to generate a list of policy rules; provisioning (506) a mutual exclusive flag for each policy rule in the generated list of policy rules; and pushing (508) a policy rule to a session management function (SMF) (110) after determining that the provisioned mutual exclusive flag is true for the policy rule.
- 13. The method (500) as claimed in claim 12, further comprising establishing a SMF session for the policy rule on receiving the request.
- 14. The method (500) as claimed in claim 12, wherein the plurality of parameters includes one or more of a rule name, an assumption, and an action.
- 15. The method (500) as claimed in claim 14, wherein the rule name and the assumption form a condition associated with the policy rule.
- 16. The method (500) as claimed in claim 15, wherein the action is executed when the condition is met for the policy rule.
- 17. The method (500) as claimed in claim 13, wherein the request includes an addition, a removal, or an updation of a policy rule in a policy rule engine (214).
- 18. The method (500) as claimed in claim 17, wherein the removal of the policy rule is communicated from a policy control function (PCF) (112) to the SMF (110) when the policy rule is successfully installed for a subscriber in the SMF session.
- 19. The method (500) as claimed in claim 12, wherein a precedence for each policy rule in the list of policy rules is defined by a user.
- 20. The method (500) as claimed in claim 18, wherein the PCF (112) is configured to remove an installed policy rule when the condition associated with the installed policy rule is not met, wherein the condition associated with the policy rule is formed based on the rule name and the assumption.
Description
SYSTEM AND METHOD FOR POLICY RULE CHANGE IN A COMMUNICATION NETWORK RESERVATION OF RIGHTS [0001] A portion of the disclosure of this patent document contains material, which is subject to intellectual property rights such as, but are not limited to, copyright, design, trademark, Integrated Circuit (IC) layout design, and/or trade dress protection, belonging to Jio Platforms Limited (JPL) or its affiliates (hereinafter referred as owner). The owner has no objection to the facsimile reproduction by anyone of the patent document or the patent disclosure, as it appears in the Patent and Trademark Office patent files or records, but otherwise reserves all rights whatsoever. All rights to such intellectual property are fully reserved by the owner. FIELD OF DISCLOSURE [0002] The embodiments of the present disclosure generally relate to a communication network. In particular, the present disclosure relates to a system and method for a policy rule change in a communication network. BACKGROUND OF DISCLOSURE [0003] The following description of related art is intended to provide background information pertaining to the field of the disclosure. This section may include certain aspects of the art that may be related to various features of the present disclosure. However, it should be appreciated that this section be used only to enhance the understanding of the reader with respect to the present disclosure, and not as admissions of prior art. [0004] Wireless communication technology has rapidly evolved over the past few decades. The first generation of wireless communication technology was based on analog technology that offered only voice services. Further, when the second-generation (2G) technology was introduced, text messaging and data services became possible. The 3G technology marked the introduction of highspeed internet access, mobile video calling, and location-based services. The fourth generation (4G) technology revolutionized the wireless communication with faster data speeds, improved network coverage, and security. Currently, the fifth generation (5G) technology is being deployed, with even faster data speeds, low latency, and the ability to connect multiple devices simultaneously. [0005] As wireless technologies are advancing, there is a need to cope with the 5G requirements and deliver a high level of service to the subscribers. Communications networks provide network services to numerous subscribers. With a lot of new features provided by communication networks, the number of subscribers accessing a network may easily reach into the millions. In order to cater to a larger number of subscribers, a network service provider needs to have the capability to manage the network to meet service agreements with each subscriber, maintain security, manage network resources, and correctly charge each subscriber. [0006] For effective network management, a set of rules needs to be specified. The specified rules may be managed by a policy rule engine. The policy rule engine may include capabilities for handling new rules, new subscribers, modifications of rules for existing subscriber, etc. [0007] There is, therefore, a need in the art to provide a method and a system that can overcome the shortcomings of the existing prior arts. OBJECTS OF THE PRESENT DISCLOSURE [0008] Some of the objects of the present disclosure, which at least one embodiment herein satisfies are as listed herein below. [0009] An object of the present disclosure is to provide the policy rule engine with the capability to remove the previously installed rules on its own if the already installed rule's condition doesn’t match. [0010] An object of the present disclosure is to provide exclusive flags to enable a specific rule to be pushed to a session management function (SMF) and ignore other rules that match the condition. [0011] An object of the present disclosure is to provide different left terms and operator choices for different interfaces. [0012] An object of the present disclosure is to enable the policy control function (PCF) not to send a remove rules command to the SMF if rules are not installed for the subscriber, and if policy rule removal is configured in the policy engine. [0013] An object of the present disclosure is to provide network operators to create new policy with action removal to avoid policy modification of existing rule. [0014] An object of the present disclosure is to evaluate two policies having matching conditions. [0015] An object of the present disclosure is to send a delta change to the SMF when the delta changes in the dynamic rule definition. DEFINITION [0016] As used in the present disclosure, the following terms are generally intended to have the meaning as set forth below, except to the extent that the context in which they are used to indicate otherwise. [0017] The term PCF as used herein, refers to Policy Control Function. The PCF is a key component of the 5G architecture and plays a crucial role in enforcing