CN117641514A - Network access method, device, terminal and communication equipment - Google Patents
Network access method, device, terminal and communication equipment Download PDFInfo
- Publication number
- CN117641514A CN117641514A CN202210996011.4A CN202210996011A CN117641514A CN 117641514 A CN117641514 A CN 117641514A CN 202210996011 A CN202210996011 A CN 202210996011A CN 117641514 A CN117641514 A CN 117641514A
- Authority
- CN
- China
- Prior art keywords
- information
- terminal
- network
- slice
- message
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W48/00—Access restriction; Network selection; Access point selection
- H04W48/18—Selecting a network or a communication service
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W36/00—Hand-off or reselection arrangements
- H04W36/08—Reselecting an access point
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W48/00—Access restriction; Network selection; Access point selection
- H04W48/16—Discovering, processing access restriction or access information
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W8/00—Network data management
- H04W8/02—Processing of mobility data, e.g. registration information at HLR [Home Location Register] or VLR [Visitor Location Register]; Transfer of mobility data, e.g. between HLR, VLR or external networks
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Security & Cryptography (AREA)
- Databases & Information Systems (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
The application discloses a network access method, a device, a terminal and communication equipment, which belong to the technical field of communication, and the network access method of the embodiment of the application comprises the following steps: the terminal receives network selection policy information, wherein the network selection policy information indicates at least one network for providing a target slice service, and the target slice is a slice which the terminal desires to inquire and/or use; and the terminal performs network access based on the network selection strategy information.
Description
Technical Field
The application belongs to the technical field of communication, and particularly relates to a network access method, a device, a terminal and communication equipment.
Background
Currently, a network side device configures a slice that a terminal in a current network is allowed to use for the terminal. However, for a slice that the terminal desires to activate for use, it is possible that the terminal is not available in the current network, which may cause the terminal to fail to use the slice, and thus fail to use the service corresponding to the slice.
Disclosure of Invention
The embodiment of the application provides a network access method, a network access device, a terminal and communication equipment, which can solve the problem that the terminal cannot use services corresponding to certain slices.
In a first aspect, a network access method is provided, including:
the terminal receives network selection policy information, wherein the network selection policy information indicates at least one network for providing a target slice service, and the target slice is a slice which the terminal desires to inquire and/or use;
and the terminal performs network access based on the network selection strategy information.
In a second aspect, a network access method is provided, including:
the method comprises the steps that first communication equipment sends network selection strategy information to a terminal, wherein the network selection strategy information indicates at least one network for providing a target slice service, and the target slice is a slice which the terminal desires to inquire and/or use;
the network selection policy information is used for network access of the terminal.
In a third aspect, there is provided a network access device, a terminal comprising the network access device, the device comprising:
a first receiving module, configured to receive network selection policy information, where the network selection policy information indicates at least one network for providing a target slice service, and the target slice is a slice that the terminal desires to query and/or use;
and the access module is used for carrying out network access based on the network selection strategy information.
In a fourth aspect, there is provided a network access apparatus, a first communication device comprising the network access apparatus, the apparatus comprising:
a first sending module, configured to send network selection policy information to a terminal, where the network selection policy information indicates at least one network for providing a target slice service, and the target slice is a slice that the terminal desires to query and/or use;
the network selection policy information is used for network access of the terminal.
In a fifth aspect, there is provided a terminal comprising a processor and a memory storing a program or instructions executable on the processor, which when executed by the processor, implement the steps of the method as described in the first aspect.
In a sixth aspect, a terminal is provided, including a processor and a communication interface, where the communication interface is configured to receive network selection policy information, where the network selection policy information indicates at least one network for providing a target slice service, and the target slice is a slice that the terminal desires to query and/or use; the processor is used for performing network access based on the network selection policy information.
In a seventh aspect, a communication device is provided, the communication device being a first communication device, the communication device comprising a processor and a memory storing a program or instructions executable on the processor, the program or instructions implementing the steps of the method according to the second aspect when executed by the processor.
An eighth aspect provides a communication device, the communication device being a first communication device, comprising a processor and a communication interface, the communication interface being configured to send network selection policy information to a terminal, the network selection policy information indicating at least one network for providing a target slice service, the target slice being a slice that the terminal desires to query and/or use; the network selection policy information is used for network access of the terminal.
In a ninth aspect, there is provided a network access system, comprising: a terminal operable to perform the steps of the network access method as described in the first aspect, and a first communication device operable to perform the steps of the network access method as described in the second aspect.
In a tenth aspect, there is provided a readable storage medium having stored thereon a program or instructions which when executed by a processor, performs the steps of the method according to the first aspect or performs the steps of the method according to the second aspect.
In an eleventh aspect, there is provided a chip comprising a processor and a communication interface coupled to the processor, the processor being for running a program or instructions to implement the method according to the first aspect or to implement the method according to the second aspect.
In a twelfth aspect, there is provided a computer program/program product stored in a storage medium, the computer program/program product being executed by at least one processor to implement the steps of the method as described in the first aspect, or to implement the method as described in the second aspect.
In the embodiment of the application, a terminal receives network selection policy information, wherein the network selection policy information indicates at least one network for providing a target slice service, and the target slice is a slice which the terminal expects to inquire and/or use; and the terminal performs network access based on the network selection strategy information. In this way, the terminal can access the network for providing the service of the target slice through the received network selection policy information, so that the service corresponding to the target slice can be used.
Drawings
Fig. 1 is a block diagram of a wireless communication system to which embodiments of the present application are applicable;
fig. 2 is a flowchart of a network access method provided in an embodiment of the present application;
fig. 3 is a flowchart of another network access method provided in an embodiment of the present application;
fig. 4 is a flowchart of another network access method provided in an embodiment of the present application;
Fig. 5 is a flowchart of another network access method provided in an embodiment of the present application;
fig. 6 is a flowchart of another network access method provided in an embodiment of the present application;
fig. 7 is a schematic diagram of a format of an information element according to an embodiment of the present application;
FIG. 8 is a schematic diagram of a format of another information element provided by an embodiment of the present application;
fig. 9 is a schematic diagram of a format of another information element provided in an embodiment of the present application;
FIG. 10 is a schematic diagram of a format of another information element provided by an embodiment of the present application;
FIG. 11 is a schematic diagram of a format of another information element provided by an embodiment of the present application;
FIG. 12 is a schematic diagram of a format of another information element provided by an embodiment of the present application;
FIG. 13 is a schematic diagram of a format of another information element provided by an embodiment of the present application;
FIG. 14 is a schematic diagram of a format of another information element provided by an embodiment of the present application;
FIG. 15 is a schematic diagram of a format of another information element provided by an embodiment of the present application;
FIG. 16 is a schematic diagram of a format of another information element provided by an embodiment of the present application;
FIG. 17 is a schematic diagram of a format of another information element provided by an embodiment of the present application;
fig. 18 is a block diagram of a network access device according to an embodiment of the present application;
Fig. 19 is a block diagram of a network access device according to an embodiment of the present application;
fig. 20 is a schematic structural diagram of a communication device according to an embodiment of the present application;
fig. 21 is a schematic structural diagram of a terminal according to an embodiment of the present application;
fig. 22 is a schematic structural diagram of another communication device according to an embodiment of the present application.
Detailed Description
Technical solutions in the embodiments of the present application will be clearly described below with reference to the drawings in the embodiments of the present application, and it is apparent that the described embodiments are some embodiments of the present application, but not all embodiments. All other embodiments obtained by a person of ordinary skill in the art based on the embodiments in the present application are within the scope of the protection of the present application.
The terms first, second and the like in the description and in the claims, are used for distinguishing between similar objects and not necessarily for describing a particular sequential or chronological order. It is to be understood that the terms so used are interchangeable under appropriate circumstances such that the embodiments of the application are capable of operation in sequences other than those illustrated or otherwise described herein, and that the terms "first" and "second" are generally intended to be used in a generic sense and not to limit the number of objects, for example, the first object may be one or more. Furthermore, in the description and claims, "and/or" means at least one of the connected objects, and the character "/" generally means a relationship in which the associated object is an "or" before and after.
It is noted that the techniques described in embodiments of the present application are not limited to long term evolution (Long Term Evolution, LTE)/LTE evolution (LTE-Advanced, LTE-a) systems, but may also be used in other wireless communication systems, such as code division multiple access (Code Division Multiple Access, CDMA), time division multiple access (Time Division Multiple Access, TDMA), frequency division multiple access (Frequency Division Multiple Access, FDMA), orthogonal frequency division multiple access (Orthogonal Frequency Division Multiple Access, OFDMA), single carrier frequency division multiple access (Single-carrier Frequency Division Multiple Access, SC-FDMA), and other systems. The terms "system" and "network" in embodiments of the present application are often used interchangeably, and the techniques described may be used for both the above-mentioned systems and radio technologies, as well as other systems and radio technologies. The following description describes a New air interface (NR) system for purposes of example and uses NR terminology in much of the description that follows, but these techniques are also applicable to applications other than NR system applications, such as generation 6 (6) th Generation, 6G) communication system.
Fig. 1 shows a block diagram of a wireless communication system to which embodiments of the present application are applicable. The wireless communication system includes a terminal 11 and a network device 12. The terminal 11 may be a mobile phone, a tablet (Tablet Personal Computer), a Laptop (Laptop Computer) or a terminal-side Device called a notebook, a personal digital assistant (Personal Digital Assistant, PDA), a palm top, a netbook, an ultra-mobile personal Computer (ultra-mobile personal Computer, UMPC), a mobile internet appliance (Mobile Internet Device, MID), an augmented reality (augmented reality, AR)/Virtual Reality (VR) Device, a robot, a Wearable Device (weather Device), a vehicle-mounted Device (VUE), a pedestrian terminal (PUE), a smart home (home Device with a wireless communication function, such as a refrigerator, a television, a washing machine, or a furniture), a game machine, a personal Computer (personal Computer, PC), a teller machine, or a self-service machine, and the Wearable Device includes: intelligent wrist-watch, intelligent bracelet, intelligent earphone, intelligent glasses, intelligent ornament (intelligent bracelet, intelligent ring, intelligent necklace, intelligent anklet, intelligent foot chain etc.), intelligent wrist strap, intelligent clothing etc.. Note that, the specific type of the terminal 11 is not limited in the embodiment of the present application. The network-side device 12 may comprise an access network device or a core network device, wherein the access network device 12 may also be referred to as a radio access network device, a radio access network (Radio Access Network, RAN), a radio access network function or a radio access network element. Access network device 12 may include a base station, a WLAN access point, a WiFi node, or the like, which may be referred to as a node B, an evolved node B (eNB), an access point, a base transceiver station (Base Transceiver Station, BTS), a radio base station, a radio transceiver, a basic service set (Basic Service Set, BSS), an extended service set (Extended Service Set, ESS), a home node B, a home evolved node B, a transmission and reception point (Transmitting Receiving Point, TRP), or some other suitable terminology in the art, and the base station is not limited to a particular technical vocabulary so long as the same technical effect is achieved, and it should be noted that in the embodiments of the present application, only a base station in an NR system is described as an example, and the specific type of the base station is not limited. The core network device may include, but is not limited to, at least one of: core network nodes, core network functions, mobility management entities (Mobility Management Entity, MME), access mobility management functions (Access and Mobility Management Function, AMF), session management functions (Session Management Function, SMF), user plane functions (User Plane Function, UPF), policy control functions (Policy Control Function, PCF), policy and charging rules function units (Policy and Charging Rules Function, PCRF), edge application service discovery functions (Edge Application Server Discovery Function, EASDF), unified data management (Unified Data Management, UDM), unified data repository (Unified Data Repository, UDR), home subscriber server (Home Subscriber Server, HSS), centralized network configuration (Centralized network configuration, CNC), network storage functions (Network Repository Function, NRF), network opening functions (Network Exposure Function, NEF), local NEF (or L-NEF), binding support functions (Binding Support Function, BSF), application functions (Application Function, AF), and the like. In the embodiment of the present application, only the core network device in the NR system is described as an example, and the specific type of the core network device is not limited. The terminal may be a User Equipment (UE).
In order to facilitate a better understanding of the embodiments of the present application, the following technical points are first described below.
(1) Slice admission and rejection
In the registration procedure, the UE first sends a registration request message to the network, the UE reports a requested slice (e.g., requested (requested) network slice selection assistance information (Network Slice Selection Assistance Information, nsai)) to the network, the requested nsai includes one or more Single network slice selection assistance information (Single-Network Slice Selection Assistance Information, nsai), and the network determines whether to allow the requested S-nsai to be served according to the UE subscription condition and the current network condition. If the requested S-NSSAI can be serviced, the S-NSSAI is put into an allowed (allowed) NSSAI to be replied to the UE; if the requested NSSAI cannot be serviced, the S-NSSAI is returned to the UE in a rejected (rejected) NSSAI. Optionally, if the UE indicates that extended (extended) reject NSSAI is supported in the 5G mobility management capability information element (5G mobility management capability Information Elements,5GMM capability IE) in the registration request message, the network side may also reply to the UE by placing an out-of-service slice in extended rejected NSSAI.
The network access method, the device, the terminal and the communication equipment provided by the embodiment of the application are described in detail below through some embodiments and application scenes thereof with reference to the accompanying drawings.
Referring to fig. 2, fig. 2 is a flowchart of a network access method provided in an embodiment of the present application, and as shown in fig. 2, the network access method includes the following steps:
step 101, a terminal receives network selection policy information, wherein the network selection policy information indicates at least one network for providing a target slice service, and the target slice is a slice which the terminal desires to inquire and/or use.
The network selection policy information may also be referred to as roaming network selection information, or roaming network selection information based on slices, or roaming network selection policy information based on slices, or the like.
In one embodiment, the terminal receives the network selection policy information, which may be that the terminal receives the network selection policy information sent by the first communication device or the second communication device.
In one embodiment, the terminal receives the network selection policy information, which may be that the terminal receives the network selection policy information associated with the target slice.
In one embodiment, the terminal receives the network selection policy information, which may be that the terminal receives the network selection policy information associated with the target slice sent by the first communication device.
In one embodiment, the network selection policy information is carried in a downlink DL non-access stratum NAS transport message or a registration accept message.
In one embodiment, the transmission mode of the network selection policy information is as follows: packaging in a container for transparent transmission.
In one embodiment, the network selection policy information is carried in a roaming guidance (Steering of Roaming, SOR) transport container for transparent transmission.
And 102, the terminal performs network access based on the network selection policy information.
The terminal can perform network access based on at least one network indicated by the network selection policy information. Illustratively, the network selection policy information may include an identification of one or more public land mobile networks (Public Land Mobile Network, PLMNs) for providing the target slice service, from which the terminal may select a PLMN for network access; and/or the network selection policy information may include network priority information of the at least one network, and the terminal may select a network from the at least one network to access based on the network priority information; and/or the network selection policy information may include a network access type, and the terminal may select a network from the at least one network to perform network access according to the network access type; etc.
It should be noted that, the network side may allow a slice providing a service in the current network, and for a slice that the UE wants to activate for use, if it is available in a neighboring or other network but not available in the current network, the current network may not provide the terminal in the related art. For slices that the UE wishes to activate for use, which are available in the proximity or other networks, the relevant mechanisms do not support information such as which network is available to the network tells the terminal. In the embodiment of the application, the terminal receives the network selection policy information and performs network access based on the network selection policy information, so that the UE supports to transfer to a network capable of providing services to register and tries to activate the services. The embodiment of the application provides a network which informs a terminal of slice-based network selection strategy information so as to solve the problem that the terminal cannot flexibly register to a corresponding network according to service requirements. The embodiment of the application solves the problem that the current network cannot provide the terminal with slices in other networks, so that the terminal can more flexibly select the slices according to the service, access the appropriate network and access the service.
In the embodiment of the application, a terminal receives network selection policy information, wherein the network selection policy information indicates at least one network for providing a target slice service, and the target slice is a slice which the terminal expects to inquire and/or use; and the terminal performs network access based on the network selection strategy information. In this way, the terminal can access the network for providing the service of the target slice through the received network selection policy information, so that the service corresponding to the target slice can be used.
Optionally, before the terminal receives the network selection policy information, the method further includes:
the terminal sends a first message to a first communication device, the first message comprising at least one of:
position information of the terminal;
and the first indication information is used for indicating whether the terminal supports network access based on the network selection policy information.
The first communication device may be a first core network device, and specifically, the first communication device may be a first core network device under a network where the current terminal is located. The first communication device may be an AMF, for example. The first message may also include slice information for the target slice. The target slice may be one or more slices requested by the terminal. The first message may be a registration request (registration request) message. The location information of the terminal may include a Cell (ID) or a tracking area identity (Tracking Area Identity, TAI), or a UE location (location) indicating a geographical location of the UE acquired through a location service (LoCation Services, LCS) architecture.
In addition, the first indication information may be a Slice-based SoR support indication (Slice-based SoR support indication) that may be used to indicate whether the terminal supports the network selection policy information.
In addition, after the first communication device receives the first message sent by the terminal, the first communication device may perform a first operation, where the first operation includes at least one of: determining whether the terminal supports network access based on the network selection policy information; and triggering a second communication device to provide the network selection strategy information for the terminal under the condition that the message sent by the terminal does not carry the target slice and the signed slice of the terminal can not provide service. The first communication device is thereby able to trigger the second communication device to provide the network selection policy information to the terminal based on the received first message.
In this embodiment, the terminal transmits a first message to the first communication device, so that the first communication device can determine a network for providing the terminal with the target slice service based on the location information of the terminal in the first message; the first communication device is capable of determining, based on the first indication information in the first message, whether the terminal supports network access based on the network selection policy information, thereby determining whether to provide the network selection policy information for the terminal.
Optionally, the network selection policy information includes at least one of:
A terminal identifier;
an identification of a public land mobile network PLMN for providing the target slice service;
slice information of the target slice;
network priority information;
a network access type;
a radio access technology, RAT;
effective time information of the network selection strategy information.
Wherein a terminal identification (e.g., UE ID) may be used to indicate the identity of the terminal to which the network selection policy information applies. The identification of the PLMN used to provide the target slice service may include an identification of one or more PLMNs. The slice information of the target slice may include nsaai. The network priority information may be used to indicate the priority of at least one network and/or the priority of a slice under the network. Illustratively, the network priority information includes: for the same slice, different networks correspond to priorities, and a higher priority indicates that the terminal can preferentially select the network for access. The network access type may include a 3GPP access type (access type) or a non-3GPP (non-3 GPP) access type, etc. The radio access technologies (Radio Access Technology, RAT) may include access technologies such as NR, LTE or universal terrestrial radio access network (Universal Terrestrial Radio Access Network, UTRAN). The valid time information of the network selection policy information may include the valid time of the network selection policy information, or the valid duration of the network selection policy information.
Optionally, the first indication information is carried in a 5G mobility management capability information element and/or a target information element.
Wherein an indication (indication) may be added in the 5G mobility management capability information element, where the indication is used to carry the first indication information. The new indication may be, for example, SBSS. When the value of the first indication information is a first preset value, the indication terminal does not support network access based on the network selection strategy information; and when the value of the first indication information is a second preset value, the indication terminal supports network access based on the network selection strategy information. For example, when the value of the first indication information is 0, the indication terminal does not support network access based on the network selection policy information; and when the value of the first indication information is 1, the indication terminal supports network access based on the network selection strategy information.
In addition, the first indication information may be carried in a target information element, which may be another existing information element other than the 5G mobility management capability information element, or may be an additional information element. For example, the target information element may be a newly added IE, which is a Slice-based SOR container (Slice-based SOR container) IE.
Optionally, the terminal performs network access based on the network selection policy information, including:
in the case that the terminal desires to use the target slice to access a network and/or establish a session, and the target slice belongs to a reject slice corresponding to the terminal, the terminal performs the following operations:
and under the condition that the terminal detects that the network selection strategy information comprises the slice information of the target slice, the terminal selects the PLMN corresponding to the target slice in the network selection strategy information to carry out network access.
The PLMN corresponding to the target slice may be a slice to which the target slice belongs to a usable PLMN. And under the condition that the network selection strategy information comprises network priority information, the terminal can select PLMN to carry out network access based on the network priority information. In the case that the network selection policy information does not include the network priority information, the terminal may select a PLMN according to a preset selection rule (for example, select the first by default) to perform network access. And under the condition that the terminal detects that the slice information of the target slice is not included in the network selection strategy information, the terminal can execute a network reselection flow.
In this embodiment, when the terminal desires to use the target slice to access a network and/or establish a session and the target slice belongs to a reject slice corresponding to the terminal, if the terminal detects that the network selection policy information includes slice information of the target slice, the terminal selects a PLMN corresponding to the target slice in the network selection policy information to perform network access, so that the PLMN accessed by the terminal can provide a target slice service for the terminal.
Optionally, before the terminal selects the PLMN corresponding to the target slice in the network selection policy information to perform network access when the terminal detects that the slice information of the target slice is included in the network selection policy information, the method further includes:
and under the condition that the terminal detects that the network selection strategy information meets the effective time information corresponding to the network selection strategy information, the terminal detects whether the network selection strategy information comprises slice information of the target slice or not.
The valid time information corresponding to the network selection policy information may include a valid period of the network selection policy information, and when the terminal detects that the network selection policy information is in the valid period, the terminal detects whether the network selection policy information includes slice information of the target slice. And under the condition that the terminal detects that the network selection strategy information does not meet the effective time information corresponding to the network selection strategy information, the terminal can execute a network reselection flow.
In this embodiment, when the terminal detects that the network selection policy information satisfies valid time information corresponding to the network selection policy information, the terminal detects whether slice information of the target slice is included in the network selection policy information, so that network access can be performed based on the network selection policy information when the network selection policy information is in a valid state.
Optionally, the terminal selects a PLMN corresponding to the target slice in the network selection policy information to perform network access, including:
and under the condition that the network selection strategy information comprises network priority information, the terminal selects PLMN to carry out network access based on the network priority information.
The network priority information may include priorities of one or more PLMNs in the network selection policy information, and the terminal may select a PLMN with a highest priority in the network selection policy information for network access.
In this embodiment, when the network selection policy information includes network priority information, the terminal selects a PLMN to perform network access based on the network priority information, so that the terminal can select a PLMN with a higher priority to perform network access.
Optionally, the network priority information includes PLMN identification priority and access technology identification priority.
The network priority information may be carried in a PLMN identity and access technology list (PLMN ID and access technology list). The priority of PLMN identification (PLMN ID) and access technology identification (access technology identifier) may be represented in descending order in PLMN ID and access technology list, illustratively, in PLMN ID and access technology list, a total of n PLMN IDs including PLMN ID 1 through PLMN ID n, PLMN ID 1 indicating the highest priority and PLMN ID n indicating the lowest priority. The terminal can select the PLMN corresponding to the PLMN ID with the highest priority to carry out network access.
Optionally, before the terminal receives the network selection policy information, the method further includes:
and the terminal sends a second message to the first communication equipment, wherein the second message is used for inquiring the network selection strategy information.
The terminal receives the network selection policy information, which may be that the terminal receives the network selection policy information sent by the first communication device.
In this embodiment, the terminal sends a second message to the first communication device, where the second message is used to query the network selection policy information, so that the first communication device can provide the network selection policy information to the terminal based on the query of the terminal.
Optionally, the terminal sends a second message to the first communication device, including:
the terminal sends a second message to the first communication device when the first condition is met;
wherein the first condition includes at least one of:
the target slice belongs to a reject slice corresponding to the terminal;
the target slice does not belong to a configuration slice of the terminal;
the first communication device indicates to the terminal that the target slice is not supported;
the terminal expects to use the target slice.
In addition, the first condition may include that the target slice belongs to a reject slice corresponding to the terminal, and the timer associated with the target slice is not 0. Associating a timer for each slice belonging to the reject slice, wherein the state of the slice belonging to the reject slice is invalid when the value of the timer is 0; when the value of the timer is not 0, the slice is valid in a state where the slice is rejected. For example, if the value of the timer is 0 or an invalid value (e.g., a negative value), the terminal does not consider the slice as a reject slice. The target slice does not belong to the configuration slice of the terminal, and may be the target slice is not in the configuration slice of the terminal.
Optionally, the second message includes at least one of:
slice information of the target slice;
position information of the terminal;
a first message identifier, where the first message identifier is used to identify that the second message is used to query the network selection policy information;
and the first indication information is used for indicating whether the terminal supports network access based on the network selection policy information.
The location information of the terminal may include a Cell ID, a TAI, or a UE location (location), which indicates a geographic location of the UE acquired through the LCS architecture. The first message identifier may be a query indication of network selection policy information (e.g., slice-based SOR information) for indicating that a current message is used to query the network side for the network selection policy information.
In addition, the second message may be an Uplink (UL) NAS TRANSPORT message or a registration request (registration request) message.
In this embodiment, the terminal can inform the network side of the slice desired to be queried and/or used by the terminal through the slice information of the target slice in the second message; the network side can conveniently provide the network selection strategy information for the terminal according to the position information of the terminal through the position information of the terminal in the second message; through the first message identifier in the second message, the terminal can inform the network side that the second message is used for inquiring the network selection strategy information; and through the first indication information in the second message, the terminal can inform the network side whether the network access is supported based on the network selection strategy information.
Optionally, the first message identification is carried in a first slice-based roaming guide SOR container information element.
The first SOR container information element may be a new information element, and the new information element for carrying the first message identifier may be named as the first SOR container information element, or other names may be set, for example, slice-based SOR container information element (Slice-based SOR container), etc., which is not limited in this embodiment.
Optionally, the first SOR container information element includes at least one of:
an identification of a first SOR container information element;
the length of the first SOR container information element;
a first container head;
a first container value;
wherein the first container header includes the first message identifier, where the first message identifier is used to characterize a request that the first communication device provide the network selection policy information; the first container value includes slice information for at least one of the target slices, the slice information including a slice length and slice content.
Optionally, the terminal receives network selection policy information, including:
the terminal receives the network selection strategy information sent by the first communication equipment through the third message;
The method further comprises the steps of:
and the terminal performs integrity check on the third message, and performs target operation based on an integrity check result.
Wherein the third message may include network selection policy information.
In this embodiment, the terminal receives, through the third message, the network selection policy information sent by the first communication device, and performs integrity check on the third message, and performs the target operation based on the result of the integrity check, so that whether the third message is complete or not can be determined through the integrity check.
Optionally, the performing the target operation based on the integrity check result includes at least one of:
if the integrity check result indicates that the third message is complete, the terminal sends a confirmation message to the first communication device, wherein the confirmation message is used for indicating that the network selection policy information is confirmed to be received;
storing network selection strategy information in the third message by the terminal under the condition that the integrity check result indicates that the third message is complete; or, in case the integrity check result indicates that the third message is complete, the terminal updates the stored network selection policy information based on the network selection policy information in the third message;
And discarding the network selection strategy information in the third message by the terminal under the condition that the integrity check result indicates that the third message is incomplete.
In one embodiment, in a case where the integrity check result indicates that the third message is complete and the third message indicates that the terminal needs to reply to the acknowledgement message to the first communication device, the terminal sends the acknowledgement message to the first communication device. The acknowledgement message may be a UL NAS transport message or a registration complete message.
Optionally, the method further comprises:
and under the condition that the network selection strategy information is updated, the terminal receives a fourth message sent by the first communication equipment, wherein the fourth message carries the updated network selection strategy information.
Wherein the fourth message may be a configuration update command (configuration update command) message. The terminal receives the network selection policy information, which may be that the terminal receives the network selection policy information sent by the first communication device.
In this embodiment, in the case where the network selection policy information is updated, the terminal receives a fourth message sent by the first communication device, where the fourth message carries updated network selection policy information, so that the terminal can perform network access based on the updated network selection policy information.
Optionally, after the terminal receives the fourth message sent by the first communication device, the method further includes:
and the terminal sends a fifth message to the first communication equipment, wherein the fifth message is used for indicating that the updated network selection strategy information is confirmed to be received.
Wherein the fifth message may be a configuration update complete (configuration update complete) message.
Optionally, the network selection policy information is characterized by a slice-based second SOR container information element, the second SOR container information element comprising at least one of:
an identification of a second SOR container information element;
the length of the second SOR container information element;
a second container head;
a second container value;
wherein the second container header includes a second message identifier, where the second message identifier is used to characterize that the first communication device provides the network selection policy information to the terminal; the second container value includes at least one slice-based SOR element field including a length of the SOR element field, a PLMN identification and access technology list, and slice information for at least one of the target slices.
In addition, the second SOR container information element may be a new information element, and the new information element for carrying the network selection policy information may be named as the second SOR container information element, or other naming may be set, for example, slice-based SOR container information element (Slice-based SOR container), etc., which is not limited in this embodiment. The second container value includes at least one Slice-based SOR element field (Slice-based SOR element). The PLMN identification and access technology list (PLMN ID and access technology list) includes n total PLMN IDs from PLMN ID 1 to PLMN ID n, PLMN ID 1 indicating the highest priority and PLMN ID n indicating the lowest priority. Illustratively, PLMN ID and access technology list carries at least 0 PLMN ID and access technology identifier combinations and at most 16 PLMN ID and access technology identifier combinations.
Optionally, the network selection policy information is carried in an SOR transmission container information element, where the SOR transmission container information element includes second indication information, where the second indication information is used to indicate whether the SOR transmission container information element carries the network selection policy information.
The second indication information may be indication information added to the SOR transmission container information element, for example, may be SBS. The second indication information may be used to indicate that the SOR transmission container information element carries the network selection policy information, or indicate that the SOR transmission container information element does not carry the network selection policy information. When the value of the second indication information is a third preset value, the SOR transmission container information element is indicated to carry the network selection strategy information; and when the value of the second indication information is a fourth preset value, indicating that the SOR transmission container information element does not carry the network selection strategy information. For example, when the value of the second indication information is 1, the SOR transmission container information element is indicated to carry the network selection policy information; and when the value of the second indication information is 0, indicating that the SOR transmission container information element does not carry the network selection strategy information.
Referring to fig. 3, fig. 3 is a flowchart of a network access method provided in an embodiment of the present application, and as shown in fig. 3, the network access method includes the following steps:
step 201, a first communication device sends network selection policy information to a terminal, wherein the network selection policy information indicates at least one network for providing a target slice service, and the target slice is a slice which the terminal desires to inquire and/or use;
the network selection policy information is used for network access of the terminal.
Optionally, before the first communication device sends the network selection policy information to the terminal, the method further includes:
the first communication device receives a first message sent by the terminal, wherein the first message comprises at least one of the following:
position information of the terminal;
and the first indication information is used for indicating whether the terminal supports network access based on the network selection policy information.
Optionally, after the first communication device receives the first message sent by the terminal, the method further includes:
the first communication device performs a first operation comprising at least one of:
determining whether the terminal supports network access based on the network selection policy information;
And triggering a second communication device to provide the network selection strategy information for the terminal under the condition that the message sent by the terminal does not carry the target slice and the signed slice of the terminal can not provide service.
Optionally, the network selection policy information includes at least one of:
a terminal identifier;
an identification of a public land mobile network PLMN for providing the target slice service;
slice information of the target slice;
network priority information;
a network access type;
a radio access technology, RAT;
effective time information of the network selection strategy information.
Optionally, before the first communication device sends the network selection policy information to the terminal, the method further includes:
and the first communication equipment receives a second message sent by the terminal, wherein the second message is used for inquiring the network selection strategy information.
Optionally, the second message includes at least one of:
slice information of the target slice;
position information of the terminal;
a first message identifier, where the first message identifier is used to identify that the second message is used to query the network selection policy information;
and the first indication information is used for indicating whether the terminal supports network access based on the network selection policy information.
Optionally, the first message identification is carried in a first slice-based roaming guide SOR container information element.
Optionally, the first SOR container information element includes at least one of:
an identification of a first SOR container information element;
the length of the first SOR container information element;
a first container head;
a first container value;
wherein the first container header includes the first message identifier, where the first message identifier is used to characterize a request that the first communication device provide the network selection policy information; the first container value includes slice information for at least one of the target slices, the slice information including a slice length and slice content.
Optionally, after the first communication device receives the second message sent by the terminal, the method further includes:
the first communication device sends a query message to the second communication device based on the second message, wherein the query message is used for querying the network selection policy information.
Optionally, the method further comprises:
and under the condition that the network selection strategy information is updated, the first communication equipment sends a fourth message to the terminal, wherein the fourth message carries the updated network selection strategy information.
Optionally, after the first communication device sends the fourth message to the terminal, the method further includes:
and the first communication equipment receives a fifth message sent by the terminal, wherein the fifth message is used for indicating to confirm that the updated network selection strategy information is received.
Optionally, the network selection policy information is characterized by a slice-based second SOR container information element, the second SOR container information element comprising at least one of:
an identification of a second SOR container information element;
the length of the second SOR container information element;
a second container head;
a second container value;
wherein the second container header includes a second message identifier, where the second message identifier is used to characterize that the first communication device provides the network selection policy information to the terminal; the second container value includes at least one slice-based SOR element field including a length of the SOR element field, a PLMN identification and access technology list, and slice information for at least one of the target slices.
Optionally, the network selection policy information is carried in an SOR transmission container information element, where the SOR transmission container information element includes second indication information, where the second indication information is used to indicate whether the SOR transmission container information element carries the network selection policy information.
It should be noted that, in this embodiment, as an implementation manner of the first communication device corresponding to the embodiment shown in fig. 2, a specific implementation manner of the first communication device may refer to a description related to the embodiment shown in fig. 2, and in order to avoid repetitive description, this embodiment is not repeated. In this way, the terminal can access the network for providing the service of the target slice through the received network selection policy information, so that the service corresponding to the target slice can be used.
The network access method provided by the embodiment of the application is described below through five specific embodiments:
example 1:
in this embodiment, the network side actively informs the terminal of the network selection policy information, and the network side sends the network selection policy information to the terminal (UE) through a network registration procedure. The first communication device is a first core network device, the second communication device is a second core network device, the first core network device is a visited public land mobile network (Visited Public Land Mobile Network, VPLMN) AMF, and the second core network device is a local public land mobile network (Home Public Land Mobile Network, HPLMN) UDM or a roaming guidance application server (Steering of Roaming application function, soR-AF). As shown in fig. 4, the specific flow is as follows:
Step (1): the terminal sends a first message to first core network equipment;
wherein the first message comprises at least one of:
requested NSSAI for indicating one or more Requested slices by the terminal;
location information of the UE, the location information of the UE including a Cell (ID) or tracking area (Tracking Area Identity, TAI) identity or a UE location (location) indicating a geographic location of the UE acquired through a location services (LoCation Services, LCS) architecture;
slice-based SoR support indication (Slice-based SoR support indication) for indicating that the terminal supports network selection policy information, one implementation is represented in a 5G mobility management capability (5 GMM capability) information element.
Wherein the first message may be a registration request (registration request) message.
Step (2): the first core network device performs a first operation after receiving the first message, the first operation including at least one of:
confirming whether the terminal supports network selection strategy information;
confirming whether the second core network equipment can provide service for the slice requested by the terminal or not;
if the current network cannot provide service for the slice requested by the terminal, the requested slice is placed in the reject slice information and sent to the terminal;
If the terminal does not carry the requested slice and the signed slice of the terminal cannot obtain service in the current network, triggering the second core network equipment to provide network selection strategy information for the terminal by the first core network equipment;
wherein the network selection policy information comprises at least one of the following:
a UE ID indicating an identity of a terminal to which the network selection policy information is applied;
a public land mobile network (Public Land Mobile Network, PLMN) ID list (list) comprising an identification of one or more public access networks, here mainly other VPLMN information, for use of available slices when accessing the terminal;
NSSAI, representing one or more slices available under the identity of each public access network;
network priority information, which represents priority information of slices under the network;
network Access type, representing Access type (Access type);
RAT, representing random access technology;
the valid time information of the network selection strategy information, such as valid period, represents the valid period of the current network selection strategy information;
step (3): the first core network device sends a third message to the terminal, wherein the third message comprises at least one of the following:
Reject NSSAI, representing a network side reject slice;
allowed NSSAI, which represents a slice accepted by the network side;
network policy information (e.g., slice-based SOR information), one implementation is carried to the terminal in SOR TRANSPORT container.
Wherein the third message may be a registration accept (registration accept) message.
Step (4): after receiving the third message, if the third message indicates that the terminal needs to reply to the first core network device by the third message, the terminal sends a confirmation message to the first core network device, where the confirmation message is used to confirm that the terminal receives the information based on the network selection policy to the first core network device.
Step (5): after receiving the network selection policy information, the terminal executes a second operation under the following conditions:
the network expects to access the network and/or establish a session using a target slice, and the target slice belongs to a reject slice at the current network, the terminal performs the following operations:
the terminal checks whether the network selection strategy information is in the effective period, if so, the terminal executes the subsequent operation, otherwise, the terminal executes the network reselection flow;
Checking whether the network selection strategy information contains the target slice, if so, executing subsequent operation by the terminal, otherwise, executing a network reselection flow by the terminal;
and the terminal selects PLMN applicable to the target slice to attempt to initiate a network access flow.
It should be noted that, if the network selection policy information includes network priority information, the terminal accesses the PLMN network with higher network priority preferentially, and in particular, the terminal may select according to the PLMN sequence in embodiment 5, that is, according to the byte sequence, the priority accesses from the high-to-low selection PLMN network.
In this embodiment, the first core network device provides slice-based network selection policy information to the terminal according to the network deployment after receiving the request of the terminal.
Example 2:
in this embodiment, the terminal actively inquires about network selection policy information at the network side, and the network side sends the network selection policy information to the terminal through Non-Access-Stratum (NAS) TRANSPORT (TRANSPORT) or registration procedure. The first communication equipment is first core network equipment, the second communication equipment is second core network equipment, the first core network equipment is VPLMN AMF, and the second core network equipment is HPLMN UDM or SoR-AF. As shown in fig. 5, the specific flow is as follows:
Steps (1) - (4): the terminal, the first core network device and the second core network device execute registration operation, and the registration process is used for establishing service connection between the terminal and a network.
This embodiment is similar to embodiment 1 except that steps (5) - (9) are actively triggered by the terminal querying the network selection policy information.
Unlike embodiment 1, in this procedure, the network side may or may not issue the network selection policy information, and in either case, the terminal is supported to initiate an active query function to actively query the network side for the network selection policy information.
Steps (5) - (6): due to service requirements or active selection of a user, the target slice which is expected to be used by the terminal cannot be used in the current network, and the terminal sends a second message to the first core network device, wherein the second message can be used for inquiring network selection strategy information associated with the target slice to the network.
Wherein the target slice is temporarily unavailable in the current network including at least one of:
the target slice belongs to a reject slice of the terminal, and the associated timer is not 0;
the target slice is not in a configuration slice of the terminal;
The first core network device informs the terminal that the target slice is not supported by the current network in a third message.
In addition, the second message includes at least one of:
a target slice for representing slice information that the terminal desires to use;
the location information of the terminal comprises Cell ID and/or TAI and/or UE location, wherein the UE location refers to the geographic position of the UE acquired by the LCS framework;
a query indication of network selection policy information (e.g., slice-based SOR information) for indicating that a current message is used for querying network selection policy information associated with the target Slice at a network side;
requested NSSAI for indicating one or more slices Requested by the terminal;
slice-based SoR support indication, used to instruct the terminal to support network selection policy information, one implementation is represented in 5GMM capability.
The second message may be a UL NAS TRANSPORT message or a registration request (registration request) message. The query indication of the network selection policy information may be characterized in a container (container), which is transparent to the visited network, and only network elements of the main network (e.g. an access management network element (Access management Function, AMF) or a unified database management network element (Unified Data Management, UDM)) can view, where the container may be an existing load (payload) container or a newly added container.
Step (7): and after receiving the second message of the terminal, the first core network equipment inquires network selection strategy information associated with the target slice from second core network equipment. The first core network device may encapsulate the second message in a container and transmit the second message to the second core network device under the main network. When the second core network equipment under the main network replies the network selection strategy information to the first core network equipment, the first core network equipment packages the network selection strategy information in a container and transmits the network selection strategy information to the terminal.
Step (8): and the first core network equipment sends a third message to the terminal, wherein the third message is used for carrying the network selection strategy information. In one embodiment, the third message may be a Downlink (DL) NAS TRANSPORT message or a registration accept (registration accept) message. The network selection policy information may be represented in a container, and for the visited network, only network elements (for example, AMF or UDM) of the main network may view the visited network, where the container may be an existing payload container container or a newly added container;
step (9): after receiving the third message, the terminal performs the following operations:
If the third message successfully passes the integrity check and the third message indicates that the terminal needs to reply an acknowledgement message to the network side, the terminal sends an acknowledgement message to the first core network device, wherein the acknowledgement message is used for acknowledging that the terminal receives network selection policy information to the network side, and the acknowledgement message can be an UL NAS transmission message or a registration completion message;
if the third message successfully passes the integrity check and the third message carries the network selection policy information, the terminal stores or updates the network selection policy information stored in a maintenance entity (Maintenance Entity, ME);
if the third message does not pass the integrity check successfully, the terminal discards the network selection strategy information in the third message;
if the third message fails to pass the integrity check, the terminal considers the current PLMN as a low priority network.
In this embodiment, the terminal actively queries the first core network device for slice-based network selection policy information according to the service requirement.
Example 3:
in this embodiment, the first communication device is a first core network device, the second communication device is a second core network device, the first core network device is a VPLMN AMF, and the second core network device is an HPLMN UDM or SoR-AF. As shown in fig. 6, the update of the network selection policy information is triggered by the network side.
Step (1): the network triggering terminal updates the network selection strategy information of the VPLM slice.
Step (2): the first core network device and the second core network device send a fourth message to the terminal due to network change and the network selection policy information is changed, wherein the fourth message is used for carrying updated network selection policy information. In one embodiment, the fourth message may be a configuration update command (configuration update command) message.
Step (3): and after receiving the fourth message, the terminal sends a fifth message to the first core network device, wherein the fifth message is used for confirming that the terminal receives the network selection policy information to a network side. In one embodiment, the fifth message may be a configuration update complete (configuration update complete) message.
Step (4): the terminal uses the SOR slices to select the appropriate VPLMN for service.
In this embodiment, the first core network device updates slice-based network selection policy information for the terminal according to the network change.
Example 4:
in this embodiment, the first indication information is carried in a 5G mobility management capability information element, where the first indication information is used to indicate whether the terminal supports network access based on the network selection policy information.
The format of the 5G mobility management capability information element is shown in fig. 7. Wherein SBSS is a new indication (indication).
Illustratively, the 5G mobility management capability information element may be added with the following:
{
slice-based SoR support (Slice-based SoR support, SBSS) (octet) 7, bit (bit) 7) this bit represents the ability to support Slice-based SoR (This bit indicates the capability to support Slice-based SoR)
Bit
0. SoR based on Slice is not supported (Slice-based SoR not supported)
1. SoR support Slice-based (Slice-based SoR supported)
}
Wherein, slice-based SoR support (SBSS) is the new part, carries first indication information. When the value of the first indication information is 0, the indication terminal does not support network access based on the network selection strategy information; and when the value of the first indication information is 1, the indication terminal supports network access based on the network selection strategy information.
Example 5:
embodiment 1: the network selection policy information is carried in the SOR transport container (transparent container).
Existing SOR transparent container may be enhanced with the addition of network selection policy information in existing SOR transparent container. As shown in FIG. 8, SBS and Slice-based SOR are added to the existing SOR transparent container. And the Slice-based SOR is the network selection strategy information. The format of the Slice-based SOR is shown in FIG. 9, and includes the Length of Slice-based SOR (Length of Slice-based SOR), the S-NSSAI value (value), and PLMN ID and access technology list. The S-NSSAI value includes the length and content of the S-NSSAI. The S-nsai value may be encoded as a length and value portion of the S-nsai information element, starting with the second octet (S-NSSAI value is coded as the length and value part of S-NSSAI information element starting with the second octet). The format of the PLMN identification and access technology list (PLMN ID and access technology list) is shown in fig. 10, PLMN ID and access technology list includes the length of the PLMN identification and access technology list (Length of PLMN ID and access technology list), PLMN identification (PLMN ID) and access technology identification (access technology identifier).
In addition, in said PLMN ID and access technology list, the priorities of PLMN IDs and access technology identifier are provided in descending order, i.e. PLMN ID 1 indicates the highest priority and PLMN ID n indicates the lowest priority. The PLMN ID and access technology list carries at least 0 and at most 16 PLMN ID and access technology identifier combinations.
Embodiment 2: the network selection policy information is carried in a new IE, which is a Slice-based SOR container (Slice-based SOR container).
As shown in fig. 11, a new message type Slice-based SOR container is added to the load container type value (Payload container type value), so as to indicate to the network side that the network selection policy information is carried to the UE in the container.
For example, payload container type value can be added with the following:
slice-based SOR container information element (slice-based SOR container IE) is a newly added IE carrying UE request information and/or network reply information. As shown in fig. 12, slice-based SOR Container IE includes a Length of Slice-based SOR Container information element (Length of Slice-based SOR Container IE), a Container header (Container header), and a Container value (Container value), where IEI represents the identity of the information element. As shown in fig. 13, the content header includes a data type (data type), and when the data type is 0, the UE requests the network side to provide the network policy information of the target slice, and at this time, the content value is one or more of the target slices, as shown in fig. 14; when the data type is 1, the network side carries the network selection policy information to the terminal, and at this time, the container value is Slice-based SOR element list in the format shown in fig. 15.
For example, when the data type is 0, the format of slice-based SOR container IE sent by the UE is shown in fig. 14, and the UE requests the network side to provide the network selection policy information of the target slice. When the data type is 1, the format of the slice-based SOR container IE replied by the network side is as shown in fig. 15, and the network selection policy information is sent to the terminal through the slice-based SOR container IE. When the data type is 1, the Slice-based SOR Container IE includes Length of Slice-based SOR information IE, content header, and Slice-based SOR element. As shown in FIG. 16, slice-based SOR element includes Length of Slice-based SOR element, S-NSSAI and PLMN ID and access technology list. The S-NSSAI includes the length and content of the S-NSSAI. The format of PLMN ID and access technology list is shown in fig. 17, PLMN ID and access technology list includes Length of PLMN ID and access technology list, PLMN ID and access technology identifier.
In addition, in said PLMN ID and access technology list, the priorities of PLMN IDs and access technology identifier are provided in descending order, i.e. PLMN ID 1 indicates the highest priority and PLMN ID n indicates the lowest priority. The PLMN ID and access technology list carries at least 0 and at most 16 PLMN ID and access technology identifier combinations.
According to the network access method provided by the embodiment of the application, the execution main body can be a network access device. In the embodiment of the present application, a network access device executes a network access method as an example, and a network access device provided in the embodiment of the present application is described.
Referring to fig. 18, fig. 18 is a block diagram of a network access device provided in an embodiment of the present application, where a terminal includes the network access device, as shown in fig. 18, a network access device 300 includes:
a first receiving module 301, configured to receive network selection policy information, where the network selection policy information indicates at least one network for providing a target slice service, and the target slice is a slice that the terminal desires to query and/or use;
an access module 302, configured to perform network access based on the network selection policy information.
Optionally, the apparatus further comprises:
a first sending module, configured to send a first message to a first communication device, where the first message includes at least one of:
position information of the terminal;
and the first indication information is used for indicating whether the terminal supports network access based on the network selection policy information.
Optionally, the network selection policy information includes at least one of:
A terminal identifier;
an identification of a public land mobile network PLMN for providing the target slice service;
slice information of the target slice;
network priority information;
a network access type;
a radio access technology, RAT;
effective time information of the network selection strategy information.
Optionally, the first indication information is carried in a 5G mobility management capability information element and/or a target information element.
Optionally, the access module is specifically configured to:
and under the condition that the terminal desires to access a network and/or establish a session by using the target slice, and the target slice belongs to a reject slice corresponding to the terminal, executing the following operations:
and under the condition that the terminal detects that the network selection strategy information comprises the slice information of the target slice, the terminal selects the PLMN corresponding to the target slice in the network selection strategy information to carry out network access.
Optionally, the apparatus further comprises:
the detection module is used for detecting whether the network selection strategy information comprises slice information of the target slice or not under the condition that the terminal detects that the network selection strategy information meets the effective time information corresponding to the network selection strategy information.
Optionally, the terminal selects a PLMN corresponding to the target slice in the network selection policy information to perform network access, including:
and under the condition that the network selection strategy information comprises network priority information, the terminal selects PLMN to carry out network access based on the network priority information.
Optionally, the network priority information includes PLMN identification priority and access technology identification priority.
Optionally, the apparatus further comprises:
and the second sending module is used for sending a second message to the first communication equipment, and the second message is used for inquiring the network selection strategy information.
Optionally, the second sending module is specifically configured to:
the terminal sends a second message to the first communication device when the first condition is met;
wherein the first condition includes at least one of:
the target slice belongs to a reject slice corresponding to the terminal;
the target slice does not belong to a configuration slice of the terminal;
the first communication device indicates to the terminal that the target slice is not supported;
the terminal expects to use the target slice.
Optionally, the second message includes at least one of:
Slice information of the target slice;
position information of the terminal;
a first message identifier, where the first message identifier is used to identify that the second message is used to query the network selection policy information;
and the first indication information is used for indicating whether the terminal supports network access based on the network selection policy information.
Optionally, the first message identification is carried in a first slice-based roaming guide SOR container information element.
Optionally, the first SOR container information element includes at least one of:
an identification of a first SOR container information element;
the length of the first SOR container information element;
a first container head;
a first container value;
wherein the first container header includes the first message identifier, where the first message identifier is used to characterize a request that the first communication device provide the network selection policy information; the first container value includes slice information for at least one of the target slices, the slice information including a slice length and slice content.
Optionally, the first receiving module is specifically configured to:
receiving the network selection strategy information sent by the first communication equipment through the third message;
The apparatus further comprises:
and the checking module is used for carrying out integrity check on the third message and executing target operation based on the integrity check result.
Optionally, the inspection module is specifically configured to at least one of:
transmitting a confirmation message to the first communication device when the integrity check result indicates that the third message is complete, wherein the confirmation message is used for indicating that the network selection policy information is confirmed to be received;
storing network selection policy information in the third message when the integrity check result indicates that the third message is complete; or, in case the integrity check result indicates that the third message is complete, updating the stored network selection policy information based on the network selection policy information in the third message;
and discarding the network selection strategy information in the third message under the condition that the integrity check result indicates that the third message is incomplete.
Optionally, the apparatus further comprises:
and the second receiving module is used for receiving a fourth message sent by the first communication equipment under the condition that the network selection strategy information is updated, wherein the fourth message carries the updated network selection strategy information.
Optionally, the apparatus further comprises:
and the third sending module is used for sending a fifth message to the first communication equipment, wherein the fifth message is used for indicating that the updated network selection strategy information is confirmed to be received.
Optionally, the network selection policy information is characterized by a slice-based second SOR container information element, the second SOR container information element comprising at least one of:
an identification of a second SOR container information element;
the length of the second SOR container information element;
a second container head;
a second container value;
wherein the second container header includes a second message identifier, where the second message identifier is used to characterize that the first communication device provides the network selection policy information to the terminal; the second container value includes at least one slice-based SOR element field including a length of the SOR element field, a PLMN identification and access technology list, and slice information for at least one of the target slices.
Optionally, the network selection policy information is carried in an SOR transmission container information element, where the SOR transmission container information element includes second indication information, where the second indication information is used to indicate whether the SOR transmission container information element carries the network selection policy information.
In the network access device in the embodiment of the present application, a first receiving module receives network selection policy information, where the network selection policy information indicates at least one network for providing a target slice service, and the target slice is a slice that the terminal desires to query and/or use; and the access module performs network access based on the network selection strategy information. In this way, the terminal can access the network for providing the service of the target slice through the received network selection policy information, so that the service corresponding to the target slice can be used.
The network access device in the embodiments of the present application may be an electronic device, for example, an electronic device with an operating system, or may be a component in an electronic device, for example, an integrated circuit or a chip. The electronic device may be a terminal, or may be other devices than a terminal. By way of example, terminals may include, but are not limited to, the types of terminals 11 listed above, other devices may be servers, network attached storage (Network Attached Storage, NAS), etc., and embodiments of the application are not specifically limited.
The network access device provided in the embodiment of the present application can implement each process implemented by the method embodiment of fig. 2, and achieve the same technical effects, so that repetition is avoided, and no further description is given here.
According to the network access method provided by the embodiment of the application, the execution main body can be a network access device. In the embodiment of the present application, a network access device executes a network access method as an example, and a network access device provided in the embodiment of the present application is described.
Referring to fig. 19, fig. 19 is a block diagram of a network access device provided in an embodiment of the present application, where a first communication apparatus includes the network access device, and as shown in fig. 19, a network access device 400 includes:
a first sending module 401, configured to send network selection policy information to a terminal, where the network selection policy information indicates at least one network for providing a target slice service, and the target slice is a slice that the terminal desires to query and/or use;
the network selection policy information is used for network access of the terminal.
Optionally, the apparatus further comprises:
the first receiving module is configured to receive a first message sent by the terminal, where the first message includes at least one of the following:
position information of the terminal;
and the first indication information is used for indicating whether the terminal supports network access based on the network selection policy information.
Optionally, the apparatus further comprises:
The device comprises an execution module for executing a first operation, wherein the first operation comprises at least one of the following steps:
determining whether the terminal supports network access based on the network selection policy information;
and triggering a second communication device to provide the network selection strategy information for the terminal under the condition that the message sent by the terminal does not carry the target slice and the signed slice of the terminal can not provide service.
Optionally, the network selection policy information includes at least one of:
a terminal identifier;
an identification of a public land mobile network PLMN for providing the target slice service;
slice information of the target slice;
network priority information;
a network access type;
a radio access technology, RAT;
effective time information of the network selection strategy information.
Optionally, the apparatus further comprises:
and the second receiving module is used for receiving a second message sent by the terminal, and the second message is used for inquiring the network selection strategy information.
Optionally, the second message includes at least one of:
slice information of the target slice;
position information of the terminal;
a first message identifier, where the first message identifier is used to identify that the second message is used to query the network selection policy information;
And the first indication information is used for indicating whether the terminal supports network access based on the network selection policy information.
Optionally, the first message identification is carried in a first slice-based roaming guide SOR container information element.
Optionally, the first SOR container information element includes at least one of:
an identification of a first SOR container information element;
the length of the first SOR container information element;
a first container head;
a first container value;
wherein the first container header includes the first message identifier, where the first message identifier is used to characterize a request that the first communication device provide the network selection policy information; the first container value includes slice information for at least one of the target slices, the slice information including a slice length and slice content.
Optionally, the apparatus further comprises:
and the second sending module is used for sending a query message to the second communication equipment based on the second message, wherein the query message is used for querying the network selection strategy information.
Optionally, the apparatus further comprises:
and the third sending module is used for sending a fourth message to the terminal under the condition that the network selection strategy information is updated, wherein the fourth message carries the updated network selection strategy information.
Optionally, the apparatus further comprises:
and the third receiving module is used for receiving a fifth message sent by the terminal, wherein the fifth message is used for indicating to confirm that the updated network selection strategy information is received.
Optionally, the network selection policy information is characterized by a slice-based second SOR container information element, the second SOR container information element comprising at least one of:
an identification of a second SOR container information element;
the length of the second SOR container information element;
a second container head;
a second container value;
wherein the second container header includes a second message identifier, where the second message identifier is used to characterize that the first communication device provides the network selection policy information to the terminal; the second container value includes at least one slice-based SOR element field including a length of the SOR element field, a PLMN identification and access technology list, and slice information for at least one of the target slices.
Optionally, the network selection policy information is carried in an SOR transmission container information element, where the SOR transmission container information element includes second indication information, where the second indication information is used to indicate whether the SOR transmission container information element carries the network selection policy information.
In the network access device in the embodiment of the present application, a first sending module sends network selection policy information to a terminal, where the network selection policy information indicates at least one network for providing a target slice service, and the target slice is a slice that the terminal desires to query and/or use; the network selection policy information is used for network access of the terminal. In this way, the terminal can access the network for providing the service of the target slice through the received network selection policy information, so that the service corresponding to the target slice can be used.
The network access device in the embodiments of the present application may be an electronic device, for example, an electronic device with an operating system, or may be a component in an electronic device, for example, an integrated circuit or a chip. The electronic device may be a terminal, or may be other devices than a terminal. By way of example, terminals may include, but are not limited to, the types of terminals 11 listed above, other devices may be servers, network attached storage (Network Attached Storage, NAS), etc., and embodiments of the application are not specifically limited.
The network access device provided in the embodiment of the present application can implement each process implemented by the method embodiment of fig. 3, and achieve the same technical effects, so that repetition is avoided, and no further description is given here.
Optionally, as shown in fig. 20, the embodiment of the present application further provides a communication device 500, including a processor 501 and a memory 502, where the memory 502 stores a program or instructions that can be executed on the processor 501, for example, when the communication device 500 is a terminal, the program or instructions implement, when executed by the processor 501, the steps of the network access method embodiment applied to the terminal, and achieve the same technical effects. When the communication device 500 is a first communication device, the program or the instructions, when executed by the processor 501, implement the steps of the network access method embodiment applied to the first communication device, and achieve the same technical effects, and for avoiding repetition, will not be described herein.
The embodiment of the application also provides a terminal, which comprises a processor and a communication interface, wherein the communication interface is used for receiving network selection policy information, the network selection policy information indicates at least one network for providing a target slice service, and the target slice is a slice which the terminal expects to inquire and/or use; the processor is used for performing network access based on the network selection policy information. The terminal embodiment corresponds to the network access method embodiment, and each implementation process and implementation manner of the network access method embodiment can be applied to the terminal embodiment, and the same technical effects can be achieved. Specifically, fig. 21 is a schematic hardware structure of a terminal implementing an embodiment of the present application.
The terminal 600 includes, but is not limited to: at least some of the components of the radio frequency unit 601, the network module 602, the audio output unit 603, the input unit 604, the sensor 605, the display unit 606, the user input unit 607, the interface unit 608, the memory 609, and the processor 610, etc.
Those skilled in the art will appreciate that the terminal 600 may further include a power source (e.g., a battery) for powering the various components, and the power source may be logically coupled to the processor 610 by a power management system so as to perform functions such as managing charging, discharging, and power consumption by the power management system. The terminal structure shown in fig. 21 does not constitute a limitation of the terminal, and the terminal may include more or less components than shown, or may combine some components, or may be arranged in different components, which will not be described in detail herein.
It should be understood that in the embodiment of the present application, the input unit 604 may include a graphics processing unit (Graphics Processing Unit, GPU) 6041 and a microphone 6042, and the graphics processor 6041 processes image data of still pictures or video obtained by an image capturing apparatus (such as a camera) in a video capturing mode or an image capturing mode. The display unit 606 may include a display panel 6061, and the display panel 6061 may be configured in the form of a liquid crystal display, an organic light emitting diode, or the like. The user input unit 607 includes at least one of a touch panel 6071 and other input devices 6072. The touch panel 6071 is also called a touch screen. The touch panel 6071 may include two parts of a touch detection device and a touch controller. Other input devices 6072 may include, but are not limited to, a physical keyboard, function keys (e.g., volume control keys, switch keys, etc.), a trackball, a mouse, a joystick, and so forth, which are not described in detail herein.
In this embodiment, after receiving downlink data from the network side device, the radio frequency unit 601 may transmit the downlink data to the processor 610 for processing; in addition, the radio frequency unit 601 may send uplink data to the network side device. Typically, the radio frequency unit 601 includes, but is not limited to, an antenna, an amplifier, a transceiver, a coupler, a low noise amplifier, a duplexer, and the like.
The memory 609 may be used to store software programs or instructions and various data. The memory 609 may mainly include a first storage area storing programs or instructions and a second storage area storing data, wherein the first storage area may store an operating system, application programs or instructions (such as a sound playing function, an image playing function, etc.) required for at least one function, and the like. Further, the memory 609 may include volatile memory or nonvolatile memory, or the memory 609 may include both volatile and nonvolatile memory. The nonvolatile Memory may be a Read-Only Memory (ROM), a Programmable ROM (PROM), an Erasable PROM (EPROM), an Electrically Erasable EPROM (EEPROM), or a flash Memory. The volatile memory may be random access memory (Random Access Memory, RAM), static RAM (SRAM), dynamic RAM (DRAM), synchronous DRAM (SDRAM), double Data Rate SDRAM (ddr SDRAM), enhanced SDRAM (Enhanced SDRAM), synchronous DRAM (SLDRAM), and Direct RAM (DRRAM). Memory 609 in the present embodiment includes, but is not limited to, these and any other suitable types of memory.
The processor 610 may include one or more processing units; optionally, the processor 610 integrates an application processor that primarily processes operations involving an operating system, user interface, application programs, etc., and a modem processor that primarily processes wireless communication signals, such as a baseband processor. It will be appreciated that the modem processor described above may not be integrated into the processor 610.
The radio frequency unit 601 is configured to receive network selection policy information, where the network selection policy information indicates at least one network for providing a target slice service, and the target slice is a slice that the terminal desires to query and/or use;
the processor 610 is configured to: and performing network access based on the network selection strategy information.
Optionally, the radio frequency unit 601 is further configured to:
the terminal sends a first message to a first communication device, the first message comprising at least one of:
position information of the terminal;
and the first indication information is used for indicating whether the terminal supports network access based on the network selection policy information.
Optionally, the network selection policy information includes at least one of:
A terminal identifier;
an identification of a public land mobile network PLMN for providing the target slice service;
slice information of the target slice;
network priority information;
a network access type;
a radio access technology, RAT;
effective time information of the network selection strategy information.
Optionally, the first indication information is carried in a 5G mobility management capability information element and/or a target information element.
Optionally, the processor 610 is further configured to:
and under the condition that the terminal desires to access a network and/or establish a session by using the target slice, and the target slice belongs to a reject slice corresponding to the terminal, executing the following operations:
and under the condition that the terminal detects that the network selection strategy information comprises the slice information of the target slice, selecting a PLMN corresponding to the target slice in the network selection strategy information to perform network access.
Optionally, the processor 610 is further configured to:
and detecting whether the network selection strategy information comprises slice information of the target slice or not under the condition that the terminal detects that the network selection strategy information meets the effective time information corresponding to the network selection strategy information.
Optionally, the processor 610 is further configured to:
And selecting PLMN to access network based on the network priority information under the condition that the network priority information is included in the network selection strategy information.
Optionally, the network priority information includes PLMN identification priority and access technology identification priority.
Optionally, the radio frequency unit 601 is further configured to:
and sending a second message to the first communication equipment, wherein the second message is used for inquiring the network selection strategy information.
Optionally, the radio frequency unit 601 is further configured to:
transmitting a second message to the first communication device if the first condition is satisfied;
wherein the first condition includes at least one of:
the target slice belongs to a reject slice corresponding to the terminal;
the target slice does not belong to a configuration slice of the terminal;
the first communication device indicates to the terminal that the target slice is not supported;
the terminal expects to use the target slice.
Optionally, the second message includes at least one of:
slice information of the target slice;
position information of the terminal;
a first message identifier, where the first message identifier is used to identify that the second message is used to query the network selection policy information;
And the first indication information is used for indicating whether the terminal supports network access based on the network selection policy information.
Optionally, the first message identification is carried in a first slice-based roaming guide SOR container information element.
Optionally, the first SOR container information element includes at least one of:
an identification of a first SOR container information element;
the length of the first SOR container information element;
a first container head;
a first container value;
wherein the first container header includes the first message identifier, where the first message identifier is used to characterize a request that the first communication device provide the network selection policy information; the first container value includes slice information for at least one of the target slices, the slice information including a slice length and slice content.
Optionally, the radio frequency unit 601 is further configured to:
receiving the network selection strategy information sent by the first communication equipment through the third message;
the processor 610 is also configured to:
and carrying out integrity check on the third message, and executing target operation based on the integrity check result.
Optionally, the processor 610 is further configured to at least one of:
transmitting a confirmation message to the first communication device when the integrity check result indicates that the third message is complete, wherein the confirmation message is used for indicating that the network selection policy information is confirmed to be received;
Storing network selection policy information in the third message when the integrity check result indicates that the third message is complete; or, in case the integrity check result indicates that the third message is complete, updating the stored network selection policy information based on the network selection policy information in the third message;
and discarding the network selection strategy information in the third message under the condition that the integrity check result indicates that the third message is incomplete.
Optionally, the radio frequency unit 601 is further configured to:
and under the condition that the network selection strategy information is updated, receiving a fourth message sent by the first communication equipment, wherein the fourth message carries the updated network selection strategy information.
Optionally, the radio frequency unit 601 is further configured to:
and sending a fifth message to the first communication device, wherein the fifth message is used for indicating that the updated network selection strategy information is confirmed to be received.
Optionally, the network selection policy information is characterized by a slice-based second SOR container information element, the second SOR container information element comprising at least one of:
an identification of a second SOR container information element;
the length of the second SOR container information element;
A second container head;
a second container value;
wherein the second container header includes a second message identifier, where the second message identifier is used to characterize that the first communication device provides the network selection policy information to the terminal; the second container value includes at least one slice-based SOR element field including a length of the SOR element field, a PLMN identification and access technology list, and slice information for at least one of the target slices.
Optionally, the network selection policy information is carried in an SOR transmission container information element, where the SOR transmission container information element includes second indication information, where the second indication information is used to indicate whether the SOR transmission container information element carries the network selection policy information.
The embodiment of the application also provides a communication device, which is a first communication device, and the first communication device may be a core network device, and includes a processor and a communication interface, where the communication interface is configured to send network selection policy information to a terminal, where the network selection policy information indicates at least one network for providing a target slice service, and the target slice is a slice that the terminal desires to query and/or use; the network selection policy information is used for network access of the terminal. The communication equipment embodiment corresponds to the network access method embodiment, and each implementation process and implementation manner of the network access method embodiment can be applied to the communication equipment embodiment and can achieve the same technical effect.
Specifically, the embodiment of the application further provides a communication device, where the communication device is a first communication device, and the first communication device may be a core network device. As shown in fig. 22, the communication device 700 includes: an antenna 701, a radio frequency device 702, a baseband device 703, a processor 704 and a memory 705. The antenna 701 is connected to a radio frequency device 702. In the uplink direction, the radio frequency device 702 receives information via the antenna 701, and transmits the received information to the baseband device 703 for processing. In the downlink direction, the baseband device 703 processes information to be transmitted, and transmits the processed information to the radio frequency device 702, and the radio frequency device 702 processes the received information and transmits the processed information through the antenna 701.
The method performed by the communication device in the above embodiment may be implemented in a baseband apparatus 703, which baseband apparatus 703 comprises a baseband processor.
The baseband apparatus 703 may, for example, comprise at least one baseband board, where a plurality of chips are disposed, as shown in fig. 8, where one chip, for example, a baseband processor, is connected to the memory 705 through a bus interface, so as to call a program in the memory 705 to perform the network device operation shown in the above method embodiment.
The communication device may also include a network interface 706, such as a common public radio interface (common public radio interface, CPRI).
Specifically, the communication device 700 of the embodiment of the present invention further includes: instructions or programs stored in the memory 705 and executable on the processor 704, the processor 704 invokes the instructions or programs in the memory 705 to perform the methods performed by the modules shown in fig. 19 and achieve the same technical effects, and are not described herein in detail to avoid repetition.
The embodiment of the present application further provides a readable storage medium, where a program or an instruction is stored on the readable storage medium, and when the program or the instruction is executed by a processor, the processes of the above-mentioned network access method embodiment are implemented, and the same technical effects can be achieved, so that repetition is avoided, and no further description is given here.
Wherein the processor is a processor in the terminal described in the above embodiment. The readable storage medium may be non-volatile or non-transitory. The readable storage medium may include a computer readable storage medium such as a computer readable memory ROM, a random access memory RAM, a magnetic or optical disk, etc.
The embodiment of the application further provides a chip, the chip includes a processor and a communication interface, the communication interface is coupled with the processor, and the processor is used for running a program or an instruction, so as to implement each process of the network access method embodiment, and achieve the same technical effect, so that repetition is avoided, and no redundant description is provided here.
It should be understood that the chips referred to in the embodiments of the present application may also be referred to as system-on-chip chips, or the like.
The embodiments of the present application further provide a computer program/program product, where the computer program/program product is stored in a storage medium, and the computer program/program product is executed by at least one processor to implement each process of the above network access method embodiment, and the same technical effects can be achieved, so that repetition is avoided, and details are not repeated herein.
The embodiment of the application also provides a network access system, which comprises: the terminal and the first communication device, the terminal can be used for executing the steps of the network access method applied to the terminal, and the network side device can be used for executing the steps of the network access method applied to the first communication device.
It should be noted that, in this document, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising one … …" does not exclude the presence of other like elements in a process, method, article, or apparatus that comprises the element. Furthermore, it should be noted that the scope of the methods and apparatus in the embodiments of the present application is not limited to performing the functions in the order shown or discussed, but may also include performing the functions in a substantially simultaneous manner or in an opposite order depending on the functions involved, e.g., the described methods may be performed in an order different from that described, and various steps may also be added, omitted, or combined. Additionally, features described with reference to certain examples may be combined in other examples.
From the above description of the embodiments, it will be clear to those skilled in the art that the above-described embodiment method may be implemented by means of software plus a necessary general hardware platform, but of course may also be implemented by means of hardware, but in many cases the former is a preferred embodiment. Based on such understanding, the technical solutions of the present application may be embodied essentially or in a part contributing to the prior art in the form of a computer software product stored in a storage medium (such as ROM/RAM, magnetic disk, optical disk), comprising several instructions for causing a terminal (which may be a mobile phone, a computer, a server, an air conditioner, or a network device, etc.) to perform the method described in the embodiments of the present application.
The embodiments of the present application have been described above with reference to the accompanying drawings, but the present application is not limited to the above-described embodiments, which are merely illustrative and not restrictive, and many forms may be made by those of ordinary skill in the art without departing from the spirit of the present application and the scope of the claims, which are also within the protection of the present application.
Claims (37)
1. A network access method, comprising:
the terminal receives network selection policy information, wherein the network selection policy information indicates at least one network for providing a target slice service, and the target slice is a slice which the terminal desires to inquire and/or use;
and the terminal performs network access based on the network selection strategy information.
2. The method of claim 1, wherein before the terminal receives the network selection policy information, the method further comprises:
the terminal sends a first message to a first communication device, the first message comprising at least one of:
position information of the terminal;
and the first indication information is used for indicating whether the terminal supports network access based on the network selection policy information.
3. The method of claim 1, wherein the network selection policy information comprises at least one of:
a terminal identifier;
an identification of a public land mobile network PLMN for providing the target slice service;
slice information of the target slice;
network priority information;
a network access type;
a radio access technology, RAT;
effective time information of the network selection strategy information.
4. The method according to claim 2, wherein the first indication information is carried in a 5G mobility management capability information element and/or a target information element.
5. A method according to claim 3, wherein the terminal performs network access based on the network selection policy information, comprising:
in the case that the terminal desires to use the target slice to access a network and/or establish a session, and the target slice belongs to a reject slice corresponding to the terminal, the terminal performs the following operations:
and under the condition that the terminal detects that the network selection strategy information comprises the slice information of the target slice, the terminal selects the PLMN corresponding to the target slice in the network selection strategy information to carry out network access.
6. The method according to claim 5, wherein, in the case that the terminal detects that the network selection policy information includes slice information of the target slice, before the terminal selects a PLMN corresponding to the target slice in the network selection policy information to perform network access, the method further comprises:
and under the condition that the terminal detects that the network selection strategy information meets the effective time information corresponding to the network selection strategy information, the terminal detects whether the network selection strategy information comprises slice information of the target slice or not.
7. The method according to claim 5, wherein the terminal selecting a PLMN corresponding to the target slice in the network selection policy information for network access comprises:
and under the condition that the network selection strategy information comprises network priority information, the terminal selects PLMN to carry out network access based on the network priority information.
8. The method of claim 3, wherein the network priority information comprises PLMN identification priority and access technology identification priority.
9. The method of claim 1, wherein before the terminal receives the network selection policy information, the method further comprises:
and the terminal sends a second message to the first communication equipment, wherein the second message is used for inquiring the network selection strategy information.
10. The method of claim 9, wherein the terminal sending the second message to the first communication device comprises:
the terminal sends a second message to the first communication device when the first condition is met;
wherein the first condition includes at least one of:
the target slice belongs to a reject slice corresponding to the terminal;
The target slice does not belong to a configuration slice of the terminal;
the first communication device indicates to the terminal that the target slice is not supported;
the terminal expects to use the target slice.
11. The method of claim 9, wherein the second message comprises at least one of:
slice information of the target slice;
position information of the terminal;
a first message identifier, where the first message identifier is used to identify that the second message is used to query the network selection policy information;
and the first indication information is used for indicating whether the terminal supports network access based on the network selection policy information.
12. The method of claim 11, wherein the first message identification is carried in a first slice-based roaming guidance SOR container information element.
13. The method of claim 12, wherein the first SOR container information element comprises at least one of:
an identification of a first SOR container information element;
the length of the first SOR container information element;
a first container head;
a first container value;
wherein the first container header includes the first message identifier, where the first message identifier is used to characterize a request that the first communication device provide the network selection policy information; the first container value includes slice information for at least one of the target slices, the slice information including a slice length and slice content.
14. The method of claim 1, wherein the terminal receives network selection policy information, comprising:
the terminal receives the network selection strategy information sent by the first communication equipment through the third message;
the method further comprises the steps of:
and the terminal performs integrity check on the third message, and performs target operation based on an integrity check result.
15. The method of claim 14, wherein the performing the target operation based on the integrity check result comprises at least one of:
if the integrity check result indicates that the third message is complete, the terminal sends a confirmation message to the first communication device, wherein the confirmation message is used for indicating that the network selection policy information is confirmed to be received;
storing network selection strategy information in the third message by the terminal under the condition that the integrity check result indicates that the third message is complete; or, in case the integrity check result indicates that the third message is complete, the terminal updates the stored network selection policy information based on the network selection policy information in the third message;
and discarding the network selection strategy information in the third message by the terminal under the condition that the integrity check result indicates that the third message is incomplete.
16. The method according to claim 1, wherein the method further comprises:
and under the condition that the network selection strategy information is updated, the terminal receives a fourth message sent by the first communication equipment, wherein the fourth message carries the updated network selection strategy information.
17. The method of claim 16, wherein after the terminal receives the fourth message sent by the first communication device, the method further comprises:
and the terminal sends a fifth message to the first communication equipment, wherein the fifth message is used for indicating that the updated network selection strategy information is confirmed to be received.
18. The method of claim 1, wherein the network selection policy information is characterized by a slice-based second SOR container information element comprising at least one of:
an identification of a second SOR container information element;
the length of the second SOR container information element;
a second container head;
a second container value;
the second container header comprises a second message identifier, wherein the second message identifier is used for representing that the first communication equipment provides the network selection strategy information for the terminal; the second container value includes at least one slice-based SOR element field including a length of the SOR element field, a PLMN identification and access technology list, and slice information for at least one of the target slices.
19. The method of claim 1, wherein the network selection policy information is carried in an SOR transport container information element, the SOR transport container information element including second indication information, the second indication information being used to indicate whether the SOR transport container information element carries the network selection policy information.
20. A network access method, comprising:
the method comprises the steps that first communication equipment sends network selection strategy information to a terminal, wherein the network selection strategy information indicates at least one network for providing a target slice service, and the target slice is a slice which the terminal desires to inquire and/or use;
the network selection policy information is used for network access of the terminal.
21. The method of claim 20, wherein before the first communication device sends the network selection policy information to the terminal, the method further comprises:
the first communication device receives a first message sent by the terminal, wherein the first message comprises at least one of the following:
position information of the terminal;
and the first indication information is used for indicating whether the terminal supports network access based on the network selection policy information.
22. The method of claim 21, wherein after the first communication device receives the first message sent by the terminal, the method further comprises:
the first communication device performs a first operation comprising at least one of:
determining whether the terminal supports network access based on the network selection policy information;
and triggering a second communication device to provide the network selection strategy information for the terminal under the condition that the message sent by the terminal does not carry the target slice and the signed slice of the terminal can not provide service.
23. The method of claim 20, wherein the network selection policy information comprises at least one of:
a terminal identifier;
an identification of a public land mobile network PLMN for providing the target slice service;
slice information of the target slice;
network priority information;
a network access type;
a radio access technology, RAT;
effective time information of the network selection strategy information.
24. The method of claim 20, wherein before the first communication device sends the network selection policy information to the terminal, the method further comprises:
And the first communication equipment receives a second message sent by the terminal, wherein the second message is used for inquiring the network selection strategy information.
25. The method of claim 24, wherein the second message comprises at least one of:
slice information of the target slice;
position information of the terminal;
a first message identifier, where the first message identifier is used to identify that the second message is used to query the network selection policy information;
and the first indication information is used for indicating whether the terminal supports network access based on the network selection policy information.
26. The method of claim 25, wherein the first message identification is carried in a first slice-based roaming guide SOR container information element.
27. The method of claim 26, wherein the first SOR container information element comprises at least one of:
an identification of a first SOR container information element;
the length of the first SOR container information element;
a first container head;
a first container value;
wherein the first container header includes the first message identifier, where the first message identifier is used to characterize a request that the first communication device provide the network selection policy information; the first container value includes slice information for at least one of the target slices, the slice information including a slice length and slice content.
28. The method of claim 24, wherein after the first communication device receives the second message sent by the terminal, the method further comprises:
the first communication device sends a query message to the second communication device based on the second message, wherein the query message is used for querying the network selection policy information.
29. The method of claim 20, wherein the method further comprises:
and under the condition that the network selection strategy information is updated, the first communication equipment sends a fourth message to the terminal, wherein the fourth message carries the updated network selection strategy information.
30. The method of claim 29, wherein after the first communication device sends a fourth message to the terminal, the method further comprises:
and the first communication equipment receives a fifth message sent by the terminal, wherein the fifth message is used for indicating to confirm that the updated network selection strategy information is received.
31. The method of claim 20, wherein the screening policy information is characterized by a slice-based second SOR container information element comprising at least one of:
An identification of a second SOR container information element;
the length of the second SOR container information element;
a second container head;
a second container value;
wherein the second container header includes a second message identifier, where the second message identifier is used to characterize that the first communication device provides the network selection policy information to the terminal; the second container value includes at least one slice-based SOR element field including a length of the SOR element field, a PLMN identification and access technology list, and slice information for at least one of the target slices.
32. The method of claim 20, wherein the network selection policy information is carried in an SOR transport container information element, the SOR transport container information element including second indication information, the second indication information being used to indicate whether the network selection policy information is carried in the SOR transport container information element.
33. A network access device, a terminal comprising the network access device, the device comprising:
a first receiving module, configured to receive network selection policy information, where the network selection policy information indicates at least one network for providing a target slice service, and the target slice is a slice that the terminal desires to query and/or use;
And the access module is used for carrying out network access based on the network selection strategy information.
34. A network access apparatus, a first communication device comprising the network access apparatus, the apparatus comprising:
a first sending module, configured to send network selection policy information to a terminal, where the network selection policy information indicates at least one network for providing a target slice service, and the target slice is a slice that the terminal desires to query and/or use;
the network selection policy information is used for network access of the terminal.
35. A terminal comprising a processor and a memory storing a program or instructions executable on the processor, which when executed by the processor, performs the steps of the network access method of any one of claims 1 to 19.
36. A communication device comprising a processor and a memory storing a program or instructions executable on the processor, which when executed by the processor, implement the steps of the network access method of any of claims 20 to 32.
37. A readable storage medium, characterized in that the readable storage medium has stored thereon a program or instructions which, when executed by a processor, implement the steps of the network access method according to any of claims 1 to 19 or the steps of the network access method according to any of claims 20 to 32.
Priority Applications (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202210996011.4A CN117641514A (en) | 2022-08-18 | 2022-08-18 | Network access method, device, terminal and communication equipment |
PCT/CN2023/113010 WO2024037512A1 (en) | 2022-08-18 | 2023-08-15 | Network access methods and apparatuses, terminal and communication device |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202210996011.4A CN117641514A (en) | 2022-08-18 | 2022-08-18 | Network access method, device, terminal and communication equipment |
Publications (1)
Publication Number | Publication Date |
---|---|
CN117641514A true CN117641514A (en) | 2024-03-01 |
Family
ID=89940692
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202210996011.4A Pending CN117641514A (en) | 2022-08-18 | 2022-08-18 | Network access method, device, terminal and communication equipment |
Country Status (2)
Country | Link |
---|---|
CN (1) | CN117641514A (en) |
WO (1) | WO2024037512A1 (en) |
Family Cites Families (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US12035229B2 (en) * | 2020-03-09 | 2024-07-09 | Qualcomm Incorporated | Slice-aware PLMN selection |
CN113630783B (en) * | 2020-05-07 | 2023-11-03 | 华为技术有限公司 | A communication method and device |
JP7600369B2 (en) * | 2020-08-12 | 2024-12-16 | アップル インコーポレイテッド | Check for roaming prompts during mobility registration |
CN113411781B (en) * | 2021-06-25 | 2022-08-05 | Oppo广东移动通信有限公司 | Request method, device, terminal and storage medium for network slicing service |
CN114125809B (en) * | 2021-10-28 | 2024-11-29 | 展讯通信(上海)有限公司 | Slice service acquisition method and related device |
-
2022
- 2022-08-18 CN CN202210996011.4A patent/CN117641514A/en active Pending
-
2023
- 2023-08-15 WO PCT/CN2023/113010 patent/WO2024037512A1/en unknown
Also Published As
Publication number | Publication date |
---|---|
WO2024037512A1 (en) | 2024-02-22 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US20240381288A1 (en) | Disaster roaming control method and apparatus, terminal, and network side device | |
CN116347591A (en) | Registration method and device of Internet of things equipment, communication equipment, core network equipment, storage medium and system | |
JP2024167439A (en) | Network selection method, information transmission method, information acquisition method and apparatus | |
CN116264663A (en) | Parameter configuration method, device, communication device, storage medium and system | |
CN117939560A (en) | Execution result reporting method, receiving method, terminal and network equipment | |
CN117641514A (en) | Network access method, device, terminal and communication equipment | |
CN116456389A (en) | Resource control method, device, terminal, network equipment and readable storage medium | |
CN117641513A (en) | Communication method, device and readable storage medium | |
CN117062097A (en) | Configuration method and device of UE policy information, first network function and terminal | |
CN117500010A (en) | Calling method, device and terminal | |
CN117062099A (en) | Method, device and storage medium for auxiliary terminal network selection | |
CN117119429A (en) | Terminal route selection policy information management method and related equipment | |
CN117676725A (en) | Communication method, device, terminal and core network node | |
CN117015002A (en) | Policy acquisition method and device | |
CN119212040A (en) | Acquisition and transmission methods, systems and devices of slice association information | |
CN119212042A (en) | Transmission processing method, network selection processing method and related equipment | |
CN118055394A (en) | Information transmission method, apparatus, communication device and readable storage medium | |
CN116828546A (en) | Session channel establishment method, device and equipment of non-3 GPP equipment | |
CN116266906A (en) | Disaster condition roaming processing method, terminal and network equipment | |
CN117641493A (en) | Information acquisition method, terminal and access network equipment | |
CN116744346A (en) | Network fault processing method, terminal, access network equipment and core network equipment | |
CN117835214A (en) | Communication method, device and readable storage medium | |
CN116939738A (en) | Session holding method, terminal and network side equipment | |
CN117544898A (en) | Positioning method, device and equipment | |
CN118175529A (en) | Communication method, terminal and core network function |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination |