[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

WO2024037512A1 - 网络接入方法、装置、终端及通信设备 - Google Patents

网络接入方法、装置、终端及通信设备 Download PDF

Info

Publication number
WO2024037512A1
WO2024037512A1 PCT/CN2023/113010 CN2023113010W WO2024037512A1 WO 2024037512 A1 WO2024037512 A1 WO 2024037512A1 CN 2023113010 W CN2023113010 W CN 2023113010W WO 2024037512 A1 WO2024037512 A1 WO 2024037512A1
Authority
WO
WIPO (PCT)
Prior art keywords
terminal
information
network
selection policy
policy information
Prior art date
Application number
PCT/CN2023/113010
Other languages
English (en)
French (fr)
Inventor
于航
康艳超
张鹏飞
Original Assignee
维沃移动通信有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 维沃移动通信有限公司 filed Critical 维沃移动通信有限公司
Publication of WO2024037512A1 publication Critical patent/WO2024037512A1/zh

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W48/00Access restriction; Network selection; Access point selection
    • H04W48/18Selecting a network or a communication service
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W36/00Hand-off or reselection arrangements
    • H04W36/08Reselecting an access point
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W48/00Access restriction; Network selection; Access point selection
    • H04W48/16Discovering, processing access restriction or access information
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W8/00Network data management
    • H04W8/02Processing of mobility data, e.g. registration information at HLR [Home Location Register] or VLR [Visitor Location Register]; Transfer of mobility data, e.g. between HLR, VLR or external networks

Definitions

  • This application belongs to the field of communication technology, and specifically relates to a network access method, device, terminal and communication equipment.
  • the network-side device configures the slices that the terminal is allowed to use in the current network for the terminal.
  • the slice that the terminal expects to activate and use it is possible that the terminal is unavailable in the current network, which will cause the terminal to be unable to use the slice and thus be unable to use the corresponding services of the slice.
  • Embodiments of the present application provide a network access method, device, terminal and communication equipment, which can solve the problem of the terminal being unable to use services corresponding to certain slices.
  • the first aspect provides a network access method, including:
  • the terminal receives network selection policy information, where the network selection policy information indicates at least one network used to provide a target slice service, and the target slice is a slice that the terminal expects to query and/or use;
  • the terminal performs network access based on the network selection policy information.
  • a network access method including:
  • the first communication device sends network selection policy information to the terminal, where the network selection policy information indicates at least one network used to provide a target slice service, and the target slice is a slice that the terminal expects to query and/or use;
  • the network selection policy information is used for the terminal to access the network.
  • a terminal includes the network access device, and the device includes:
  • a first receiving module configured to receive network selection policy information, where the network selection policy information indicates at least one network used to provide a target slice service, and the target slice is a slice that the terminal expects to query and/or use;
  • An access module configured to perform network access based on the network selection policy information.
  • a network access device in a fourth aspect, includes the first communication device, and the device includes:
  • a first sending module configured to send network selection policy information to the terminal, where the network selection policy information indicates at least one network used to provide a target slice service, and the target slice is a slice that the terminal expects to query and/or use;
  • the network selection policy information is used for the terminal to access the network.
  • a terminal in a fifth aspect, includes a processor and a memory, and the memory stores information that can be stored in the A program or instructions running on a processor, which when executed by the processor implement the steps of the method described in the first aspect.
  • a terminal including a processor and a communication interface, wherein the communication interface is used to receive network selection policy information, and the network selection policy information indicates at least one network used to provide target slicing services, so The target slice is a slice that the terminal expects to query and/or use; and the processor is configured to perform network access based on the network selection policy information.
  • a communication device is provided.
  • the communication device is a first communication device.
  • the communication device includes a processor and a memory.
  • the memory stores a program or instructions that can be run on the processor.
  • the program or The instructions when executed by the processor, implement the steps of the method of the second aspect.
  • a communication device is provided.
  • the communication device is a first communication device and includes a processor and a communication interface.
  • the communication interface is used to send network selection strategy information to a terminal, and the network selection strategy information indication is used to At least one network that provides a target slice service, and the target slice is a slice that the terminal desires to query and/or use; wherein the network selection policy information is used for network access by the terminal.
  • a ninth aspect provides a network access system, including: a terminal and a first communication device.
  • the terminal can be used to perform the steps of the network access method as described in the first aspect.
  • the first communication device can be used to Perform the steps of the network access method described in the second aspect.
  • a readable storage medium In a tenth aspect, a readable storage medium is provided. Programs or instructions are stored on the readable storage medium. When the programs or instructions are executed by a processor, the steps of the method described in the first aspect are implemented, or the steps of the method are implemented as described in the first aspect. The steps of the method described in the second aspect.
  • a chip in an eleventh aspect, includes a processor and a communication interface.
  • the communication interface is coupled to the processor.
  • the processor is used to run programs or instructions to implement the method described in the first aspect. method, or implement a method as described in the second aspect.
  • a computer program/program product is provided, the computer program/program product is stored in a storage medium, and the computer program/program product is executed by at least one processor to implement as described in the first aspect the steps of the method, or implement the method as described in the second aspect.
  • the terminal receives network selection policy information, the network selection policy information indicates at least one network used to provide a target slice service, and the target slice is a slice that the terminal expects to query and/or use;
  • the terminal performs network access based on the network selection policy information. In this way, the terminal can access the network used to provide the target slice service through the received network selection policy information, so that it can use the service corresponding to the target slice.
  • Figure 1 is a block diagram of a wireless communication system applicable to the embodiment of the present application.
  • Figure 2 is a flow chart of a network access method provided by an embodiment of the present application.
  • Figure 3 is a flow chart of another network access method provided by an embodiment of the present application.
  • Figure 4 is a flow chart of another network access method provided by an embodiment of the present application.
  • Figure 5 is a flow chart of another network access method provided by an embodiment of the present application.
  • Figure 6 is a flow chart of another network access method provided by an embodiment of the present application.
  • Figure 7 is a schematic diagram of the format of an information element provided by an embodiment of the present application.
  • Figure 8 is a schematic diagram of the format of another information element provided by an embodiment of the present application.
  • Figure 9 is a schematic diagram of the format of another information element provided by an embodiment of the present application.
  • Figure 10 is a schematic diagram of the format of another information element provided by an embodiment of the present application.
  • Figure 11 is a schematic diagram of the format of another information element provided by an embodiment of the present application.
  • Figure 12 is a schematic diagram of the format of another information element provided by an embodiment of the present application.
  • Figure 13 is a schematic diagram of the format of another information element provided by an embodiment of the present application.
  • Figure 14 is a schematic diagram of the format of another information element provided by an embodiment of the present application.
  • Figure 15 is a schematic diagram of the format of another information element provided by an embodiment of the present application.
  • Figure 16 is a schematic diagram of the format of another information element provided by an embodiment of the present application.
  • Figure 17 is a schematic diagram of the format of another information element provided by an embodiment of the present application.
  • Figure 18 is a structural diagram of a network access device provided by an embodiment of the present application.
  • Figure 19 is a structural diagram of another network access device provided by an embodiment of the present application.
  • Figure 20 is a schematic structural diagram of a communication device provided by an embodiment of the present application.
  • Figure 21 is a schematic structural diagram of a terminal provided by an embodiment of the present application.
  • Figure 22 is a schematic structural diagram of another communication device provided by an embodiment of the present application.
  • first, second, etc. in the description and claims of this application are used to distinguish similar objects and are not used to describe a specific order or sequence. It is to be understood that the terms so used are interchangeable under appropriate circumstances so that the embodiments of the present application can be practiced in sequences other than those illustrated or described herein, and that "first" and “second” are distinguished objects It is usually one type, and the number of objects is not limited.
  • the first object can be one or multiple.
  • “and/or” in the description and claims indicates at least one of the connected objects, and the character “/" generally indicates that the related objects are in an "or” relationship.
  • LTE Long Term Evolution
  • LTE-Advanced, LTE-A Long Term Evolution
  • LTE-A Long Term Evolution
  • CDMA Code Division Multiple Access
  • TDMA Time Division Multiple Access
  • FDMA Frequency Division Multiple Access
  • OFDMA Orthogonal Frequency Division Multiple Access
  • SC-FDMA Single-carrier Frequency Division Multiple Access
  • NR New Radio
  • FIG. 1 shows a block diagram of a wireless communication system to which embodiments of the present application are applicable.
  • the wireless communication system includes a terminal 11 and a network side device 12.
  • the terminal 11 may be a mobile phone, a tablet computer (Tablet Personal Computer), a laptop computer (Laptop Computer), or a notebook computer, a personal digital assistant (Personal Digital Assistant, PDA), a palmtop computer, a netbook, or a super mobile personal computer.
  • Tablet Personal Computer Tablet Personal Computer
  • laptop computer laptop computer
  • PDA Personal Digital Assistant
  • PDA Personal Digital Assistant
  • UMPC ultra-mobile personal computer
  • UMPC mobile Internet device
  • MID mobile Internet Device
  • AR augmented reality
  • VR virtual reality
  • robots wearable devices
  • WUE Vehicle User Equipment
  • PUE Pedestrian User Equipment
  • smart home home equipment with wireless communication functions, such as refrigerators, TVs, washing machines or furniture, etc.
  • game consoles personal computers (personal computer, PC), teller machine or self-service machine and other terminal-side devices.
  • Wearable devices include: smart watches, smart bracelets, smart headphones, smart glasses, smart jewelry (smart bracelets, smart bracelets, smart rings, smart necklaces, smart anklets) bracelets, smart anklets, etc.), smart wristbands, smart clothing, etc.
  • the network side device 12 may include an access network device or a core network device, where the access network device may also be called a radio access network device, a radio access network (Radio Access Network, RAN), a radio access network function or a wireless access network unit.
  • Access network equipment may include a base station, a Wireless Local Area Network (WLAN) access point or a WiFi node, etc.
  • WLAN Wireless Local Area Network
  • the base station may be called a Node B, an Evolved Node B (eNB), an access point, a base transceiver station ( Base Transceiver Station (BTS), radio base station, radio transceiver, Basic Service Set (BSS), Extended Service Set (ESS), home B-node, home evolved B-node, transmitting and receiving point ( Transmitting Receiving Point (TRP) or some other appropriate terminology in the field, as long as the same technical effect is achieved, the base station is not limited to specific technical terms. It should be noted that in the embodiment of this application, only in the NR system The base station is introduced as an example, and the specific type of base station is not limited.
  • Core network equipment may include but is not limited to at least one of the following: core network nodes, core network functions, mobility management entities (Mobility Management Entity, MME), access mobility management functions (Access and Mobility Management Function, AMF), session management functions (Session Management Function, SMF), User Plane Function (UPF), Policy Control Function (PCF), Policy and Charging Rules Function (PCRF), Edge Application Service Discovery function (Edge Application Server Discovery Function, EASDF), Unified Data Management (UDM), Unified Data Repository (UDR), Home Subscriber Server (HSS), centralized network configuration ( Centralized network configuration (CNC), Network Repository Function (NRF), Network Exposure Function (NEF), Local NEF (Local NEF, or L-NEF), Binding Support Function (Binding Support Function, BSF), application function (Application Function, AF), etc.
  • MME mobility management entities
  • AMF Access and Mobility Management Function
  • SMF Session Management Function
  • UPF User Plane Function
  • PCF Policy Control Function
  • the UE will send a registration request message to the network side, and the UE will report the requested slice (for example, the requested (requested) Network Slice Selection Assistance Information (NSSAI)) to the network, requested NSSAI contains one or more single-Network Slice Selection Assistance Information (NSSAI).
  • the network determines whether to provide services for the requested S-NSSAI based on the UE contract status and current network conditions. If the requested S-NSSAI can be served, the S-NSSAI will be placed in the allowed (allowed) NSSAI and replied to the UE; if the requested NSSAI cannot be served, the S-NSSAI will be placed in the rejected (rejected) Reply to UE in NSSAI.
  • the network side will also be unable to serve.
  • the slice is put into the extended rejected NSSAI and returned to the UE.
  • Figure 2 is a flow chart of a network access method provided by an embodiment of the present application. As shown in Figure 2, the network access method includes the following steps:
  • Step 101 The terminal receives network selection policy information, where the network selection policy information indicates at least one network used to provide a target slice service, and the target slice is a slice that the terminal desires to query and/or use.
  • the network selection policy information may also be called roaming network selection information, or slice-based roaming network selection information, or roaming network selection policy information, or slice-based roaming network selection policy information, and so on.
  • the terminal receives the network selection policy information, which may be that the terminal receives the network selection policy information sent by the first communication device or the second communication device.
  • the terminal receives the network selection policy information, which may be: the terminal receives the network selection policy information associated with the target slice.
  • the terminal receives the network selection policy information.
  • the terminal may receive the network selection policy information associated with the target slice sent by the first communication device.
  • the network selection policy information is carried in a downlink (DL) non-access-stratum (NAS) transmission message or a registration acceptance message.
  • DL downlink
  • NAS non-access-stratum
  • the network selection policy information is transmitted in a manner of encapsulating it in a container for transparent transmission.
  • the network selection policy information is carried in a Steering of Roaming (SOR) transmission container for transparent transmission.
  • SOR Steering of Roaming
  • Step 102 The terminal performs network access based on the network selection policy information.
  • the terminal may perform network access based on at least one network indicated by the network selection policy information.
  • the network selection policy information may include the identification of one or more public land mobile networks (Public Land Mobile Network, PLMN) used to provide the target slice service, and the terminal may select a PLMN from the one or more PLMNs.
  • Network access; and/or, the network selection policy information may include network priority information of the at least one network, and the terminal may select a network from the at least one network for access based on the network priority information; and/or, network selection
  • the policy information may include a network access type, and the terminal may select a network from the at least one network to perform network access according to the network access type; and so on.
  • the network side will allow slices to provide services in the current network.
  • slices that the UE wants to activate and use if they are available in neighboring or other networks but are not available in the current network, in related technologies, The current network will not provide it to the terminal.
  • the slice that the UE wants to activate and use it is available in neighboring or other networks.
  • the relevant mechanism does not support the network to tell the terminal which network is available and other information.
  • the terminal receives the network selection policy information and performs network access based on the network selection policy information, so that the UE supports transferring to a network that can provide services for registration and attempts to activate the service.
  • Embodiments of the present application provide a network that notifies terminals of slice-based network selection policy information to solve the problem that terminals cannot flexibly register to corresponding networks according to business requirements.
  • the embodiments of the present application solve the problem that the current network cannot provide slices in other networks for terminals, allowing the terminal to more flexibly select slices according to the business, and access appropriate networks and services.
  • the terminal receives network selection policy information, the network selection policy information indicates at least one network used to provide a target slice service, and the target slice is a slice that the terminal expects to query and/or use;
  • the terminal performs network access based on the network selection policy information. In this way, the terminal can access the network used to provide the target slice service through the received network selection policy information, so that it can use the service corresponding to the target slice.
  • the method before the terminal receives the network selection policy information, the method further includes:
  • the terminal sends a first message to the first communication device, where the first message includes at least one of the following:
  • the location information of the terminal is the location information of the terminal.
  • the first indication information is used to indicate whether the terminal supports network access based on the network selection policy information.
  • the first communication device may be a first core network device. Specifically, the first communication device may be a first core network device in a network where the current terminal is located. By way of example, the first communication device may be an AMF.
  • the first message may also include slice information of the target slice.
  • the target slice may be one or more slices requested by the terminal.
  • the first message may be a registration request message.
  • the location information of the terminal may include a cell (Cell) identifier (Identifier, ID), a tracking area identifier (Tracking Area Identity, TAI), or a UE location (location).
  • the UE location is represented by the location services (Location Services, LCS) architecture. Obtain the geographical location of the UE.
  • LCS Location Services
  • the first indication information may be a slice-based SoR support indication (Slice-based SoR support indication), which may be used to indicate whether the terminal supports network selection policy information.
  • Slice-based SoR support indication Slice-based SoR support indication
  • the first communication device may perform a first operation, and the first operation includes at least one of the following: determining whether the terminal supports network selection based on the policy information Perform network access; when the message sent by the terminal does not carry the target slice and none of the subscribed slices of the terminal can provide services, trigger the second communication device to provide the network selection policy information to the terminal ; When the terminal carries the target slice and the requested slices are all rejected slices, that is, if the current network cannot provide services for the slices requested by the terminal, the second core network device is triggered Provide the network selection policy information to the terminal. Therefore, the first communication device can trigger the second communication device to provide the network selection policy information to the terminal based on the received first message.
  • the terminal sends the first message to the first communication device, so that the first communication device can determine the network used to provide the target slicing service for the terminal based on the location information of the terminal in the first message; the first communication device can determine based on the location information of the terminal in the first message; The first indication information in the first message determines whether the terminal supports network access based on network selection policy information, thereby determining whether to provide the terminal with network selection policy information.
  • the network selection policy information includes at least one of the following:
  • Radio Access Technology (RAT)
  • the terminal identification (for example, UE ID) may be used to represent the identification of the terminal to which the network selection policy information applies.
  • the identity of the PLMN used to provide the target slice service may include the identities of one or more PLMNs.
  • the slice information of the target slice may include NSSAI.
  • the network priority information may be used to represent the priority of at least one network and/or the priority of slices under the network. For example, the network priority information includes: for the same slice, the priorities corresponding to different networks. The higher the priority, the terminal will preferentially select the network for access.
  • the network access type may include 3GPP access type (access type) or non-3GPP (non-3GPP) access type, etc.
  • Radio access technology can include access technologies such as NR, LTE or Universal Terrestrial Radio Access Network (UTRAN).
  • the validity time information of the network selection policy information may include the validity time of the network selection policy information, or the validity period of the network selection policy information, or the validity period of the network selection policy information.
  • the first indication information is carried in a 5G mobility management capability information element and/or a target information element.
  • an indication may be added to the 5G mobility management capability information element, and the new indication may be used to carry the first indication information.
  • the new indication may be slice-based SoR support (SBSS).
  • SBSS slice-based SoR support
  • the terminal When the value of the first indication information is the first preset value, the terminal is instructed not to support network access based on the network selection policy information; when the value of the first indication information is the second preset value, the terminal is instructed to support network access based on the network selection policy information.
  • the network selection policy information is used for network access. For example, when the value of the first indication information is 0, it indicates that the terminal does not support network access based on the network selection policy information; when the value of the first indication information is 1, it indicates that the terminal supports network access based on the network selection policy information. Use the following information to access the network.
  • the first indication information may be carried in a target information element, and the target information element may be an existing information element other than the 5G mobility management capability information element, or the target information element may be a newly added information element.
  • the target information element can be a new IE, and the new IE is a slice-based SOR container (Slice-based SOR container) IE.
  • the terminal performs network access based on the network selection policy information, including:
  • the terminal In the case where the terminal desires to use the target slice to access the network and/or establish a session, and the target slice belongs to the rejected slice corresponding to the terminal, the terminal performs the following operations:
  • the terminal When the terminal detects that the network selection policy information includes the slice information of the target slice, the terminal selects the PLMN corresponding to the target slice in the network selection policy information for network access.
  • the PLMN corresponding to the target slice may be a slice available under the PLMN to which the target slice belongs.
  • the terminal may select a PLMN for network access based on the network priority information.
  • the terminal may select a PLMN for network access according to a preset selection rule (for example, the first one is selected by default).
  • the terminal may perform a re-selection process.
  • the terminal when the terminal desires to use the target slice to access the network and/or establish a session, and the target slice belongs to the rejection slice corresponding to the terminal, if the terminal detects the selected If the network policy information includes the slice information of the target slice, the terminal selects the PLMN corresponding to the target slice in the network selection policy information for network access, so that the PLMN accessed by the terminal can provide the target slice for the terminal. Serve.
  • the terminal when the terminal detects that the network selection policy information includes slice information of the target slice, the terminal selects a PLMN corresponding to the target slice in the network selection policy information.
  • the method also includes:
  • the terminal detects whether the network selection policy information includes the slice information of the target slice.
  • the validity time information corresponding to the network selection policy information may include the validity period of the network selection policy information.
  • the terminal may perform a re-selection process.
  • the terminal when the terminal detects that the network selection policy information satisfies the valid time information corresponding to the network selection policy information, the terminal detects whether the network selection policy information includes the target slice. slice information, so that network access can be performed based on the network selection policy information when the network selection policy information is in a valid state.
  • the terminal selects the PLMN corresponding to the target slice in the network selection policy information for network access, including:
  • the terminal Information selects PLMN for network access.
  • the network priority information may include the priorities of one or more PLMNs in the network selection policy information, and the terminal may select the PLMN with the highest priority in the network selection policy information for network access.
  • the terminal when the network selection policy information includes network priority information, the terminal selects a PLMN for network access based on the network priority information. In this way, the terminal can select a higher priority PLMN. Perform network access.
  • the network priority information includes PLMN identification priority and access technology identification priority.
  • the network priority information can be carried in the PLMN ID and access technology list (PLMN ID and access technology list).
  • the priority of PLMN ID and access technology identifier can be expressed in descending order in the PLMN ID and access technology list.
  • the PLMN ID and access technology list includes PLMN ID. There are a total of n PLMN IDs from 1 to PLMN ID n, PLMN ID 1 indicates the highest priority, and PLMN ID n indicates the lowest priority.
  • the terminal can select the PLMN corresponding to the PLMN ID with the highest priority for network access.
  • the method before the terminal receives the network selection policy information, the method further includes:
  • the terminal sends a second message to the first communication device, where the second message is used to query the network selection policy information.
  • the terminal receives the network selection policy information, which may be: the terminal receives the network selection policy information sent by the first communication device.
  • the terminal sends a second message to the first communication device, and the second message is used to query the network selection policy information, so that the first communication device can provide the terminal with the query based on the terminal's query.
  • Network selection strategy information is used to query the network selection policy information, so that the first communication device can provide the terminal with the query based on the terminal's query.
  • the terminal sends a second message to the first communication device, including:
  • the terminal When the first condition is met, the terminal sends a second message to the first communication device;
  • the first condition includes at least one of the following:
  • the target slice belongs to the rejected slice corresponding to the terminal
  • the target slice does not belong to the configuration slice of the terminal
  • the first communication device indicates to the terminal that the target slice is not supported
  • the terminal desires to use the target slice.
  • the first condition may include that the target slice belongs to the rejection slice corresponding to the terminal, and the timer associated with the target slice is not 0.
  • a timer is associated with each slice that is a rejected slice. When the value of the timer is 0, the slice's status as a rejected slice is invalid; when the timer value is not 0, the slice's status as a rejected slice is valid. . For example, if the value of the timer is 0 or an invalid value (eg, a negative value), the terminal will not treat the slice as a rejected slice.
  • the target slice does not belong to the configuration slice of the terminal. It may be that the target slice is not in the configuration slice of the terminal.
  • the second message includes at least one of the following:
  • the location information of the terminal is the location information of the terminal.
  • a first message identifier is used to identify the second message for querying the network selection policy information
  • the first indication information is used to indicate whether the terminal supports network access based on the network selection policy information.
  • the location information of the terminal may include Cell ID, or TAI, or UE location (location).
  • the UE location represents the geographical location of the UE obtained through the LCS architecture.
  • the first message identifier may be a query indication of network selection policy information (for example, Slice-based SOR information), used to indicate that the current message is used to query the network selection policy information on the network side.
  • the second message may be an uplink (UL) NAS TRANSPORT message or a registration request (registration request) message.
  • UL uplink
  • registration request registration request
  • the terminal can inform the network side of the slice that it expects to query and/or use; through the location information of the terminal in the second message, it can facilitate the network side according to the terminal's location information.
  • the location information provides the terminal with network selection strategy information; through the first message identifier in the second message, the terminal can inform the network side that the second message is used to query the network selection strategy information; through the first indication information in the second message , the terminal can inform the network side whether it supports network access based on the network selection policy information.
  • the first message identifier is carried in a slice-based first roaming guidance SOR container information element.
  • the first SOR container information element may be a new information element, and the new information element used to carry the first message identifier may be named the first SOR container information element. Other names may also be set, for example, based on slices. SOR container information element (Slice-based SOR container), etc., this embodiment does not limit this.
  • the first SOR container information element includes at least one of the following:
  • the first container header includes the first message identifier, and the first message identifier is used to represent a request for the first communication device to provide the network selection policy information;
  • the first container value includes at least one Slice information of the target slice, the slice information includes slice length and slice content.
  • the terminal receives network selection policy information, including:
  • the terminal receives the network selection policy information sent by the first communication device through the third message;
  • the method also includes:
  • the terminal performs an integrity check on the third message, and performs a target operation based on the integrity check result.
  • the third message may include network selection policy information.
  • the terminal receives the network selection policy information sent by the first communication device through the third message, the terminal performs an integrity check on the third message, and performs the target operation based on the integrity check result. In this way, the terminal can complete the A sex check determines whether the third message is complete.
  • performing the target operation based on the integrity check result includes at least one of the following:
  • the terminal sends a message to the first communication device.
  • Prepare to send a confirmation message the confirmation message being used to indicate confirmation of receipt of the network selection policy information;
  • the terminal stores the network selection policy information in the third message; or, when the integrity check result indicates that the third message is complete In the case of , the terminal updates the stored network selection policy information based on the network selection policy information in the third message;
  • the terminal discards the network selection policy information in the third message.
  • the terminal when the integrity check result indicates that the third message is complete, and the third message indicates that the terminal needs to reply a confirmation message to the first communication device, the terminal sends a confirmation message to the first communication device.
  • the communications device sends a confirmation message.
  • the confirmation message can be a UL NAS transmission message or a registration completion message.
  • the method also includes:
  • the terminal When the network selection policy information is updated, the terminal receives a fourth message sent by the first communication device, and the fourth message carries the updated network selection policy information.
  • the fourth message may be a configuration update command message.
  • the terminal receives the network selection policy information. It may be that the terminal receives the network selection policy information sent by the first communication device.
  • the terminal when the network selection policy information is updated, the terminal receives a fourth message sent by the first communication device, and the fourth message carries the updated network selection policy information, so that the terminal can Network access is performed based on the updated network selection policy information.
  • the method further includes:
  • the terminal sends a fifth message to the first communication device, where the fifth message is used to indicate confirmation of receipt of the updated network selection policy information.
  • the fifth message may be a configuration update complete message.
  • the network selection policy information is represented by a second SOR container information element based on slices, and the second SOR container information element includes at least one of the following:
  • the second container header includes a second message identifier, and the second message identifier is used to represent that the first communication device provides the network selection policy information to the terminal;
  • the second container value includes at least A slice-based SOR element field, the SOR element field includes the length of the SOR element field, a PLMN identification and access technology list, and slice information of at least one of the target slices.
  • the second SOR container information element can be a new information element, and the new information element used to carry network selection policy information can be named the second SOR container information element.
  • Other names can also be set, for example, based on slices.
  • SOR container information element (Slice-based SOR container), etc., this embodiment does not limit this.
  • the second container value includes at least one slice-based SOR element field (Slice-based SOR element).
  • PLMN logo The PLMN ID and access technology list includes a total of n PLMN IDs from PLMN ID 1 to PLMN ID n, PLMN ID 1 indicates the highest priority, and PLMN ID n indicates the lowest priority.
  • the PLMN ID and access technology list carries at least 0 PLMN ID and access technology identifier combinations and at most 16 PLMN ID and access technology identifier combinations.
  • the network selection policy information is carried in a SOR transmission container information element.
  • the SOR transmission container information element includes second indication information.
  • the second indication information is used to indicate whether the SOR transmission container information element contains Carry the network selection policy information.
  • the second indication information may be newly added indication information in the SOR transmission container information element, and may be SBS, for example.
  • the second indication information may be used to indicate that the SOR transmission container information element carries the network selection policy information, or to indicate that the SOR transmission container information element does not carry the network selection policy information. For example, when the value of the second indication information is the third preset value, the SOR transmission container information element is instructed to carry the network selection policy information; when the value of the second indication information is the fourth preset value, Indicate that the SOR transmission container information element does not carry the network selection policy information.
  • the SOR transmission container information element when the value of the second indication information is 1, it indicates that the SOR transmission container information element carries the network selection policy information; when the value of the second indication information is 0, it indicates that the SOR transmission container information element carries the network selection policy information. does not carry the network selection policy information.
  • Figure 3 is a flow chart of a network access method provided by an embodiment of the present application. As shown in Figure 3, the network access method includes the following steps:
  • Step 201 The first communication device sends network selection policy information to the terminal, where the network selection policy information indicates at least one network used to provide a target slice service, and the target slice is a slice that the terminal expects to query and/or use;
  • the network selection policy information is used for the terminal to access the network.
  • the method before the first communication device sends the network selection policy information to the terminal, the method further includes:
  • the first communication device receives a first message sent by the terminal, and the first message includes at least one of the following:
  • the location information of the terminal is the location information of the terminal.
  • the first indication information is used to indicate whether the terminal supports network access based on the network selection policy information.
  • the method further includes:
  • the first communication device performs a first operation, and the first operation includes at least one of the following:
  • the second communication device When the first message carries the target slice, and the target slice belongs to the rejection slice corresponding to the terminal, the second communication device is triggered to provide the network selection policy information to the terminal.
  • the network selection policy information includes at least one of the following:
  • Radio access technology RAT Radio access technology
  • the method before the first communication device sends the network selection policy information to the terminal, the method further includes:
  • the first communication device receives a second message sent by the terminal, and the second message is used to query the network selection policy information.
  • the second message includes at least one of the following:
  • the location information of the terminal is the location information of the terminal.
  • a first message identifier is used to identify the second message for querying the network selection policy information
  • the first indication information is used to indicate whether the terminal supports network access based on the network selection policy information.
  • the first message identifier is carried in a slice-based first roaming guidance SOR container information element.
  • the first SOR container information element includes at least one of the following:
  • the first container header includes the first message identifier, and the first message identifier is used to represent a request for the first communication device to provide the network selection policy information;
  • the first container value includes at least one Slice information of the target slice, the slice information includes slice length and slice content.
  • the method further includes:
  • the first communication device sends a query message to the second communication device based on the second message, where the query message is used to query the network selection policy information.
  • the method also includes:
  • the first communication device When the network selection policy information is updated, the first communication device sends a fourth message to the terminal, where the fourth message carries the updated network selection policy information.
  • the method further includes:
  • the first communication device receives a fifth message sent by the terminal, where the fifth message is used to indicate confirmation of receipt of the updated network selection policy information.
  • the network selection policy information is represented by a second SOR container information element based on slices, and the second SOR container information element includes at least one of the following:
  • the second container header includes a second message identifier, and the second message identifier is used to represent that the first communication device provides the network selection policy information to the terminal;
  • the second container value includes at least A slice-based SOR element field, the SOR element field includes the length of the SOR element field, a PLMN identification and access technology list, and slice information of at least one of the target slices.
  • the network selection policy information is carried in a SOR transmission container information element.
  • the SOR transmission container information element includes second indication information.
  • the second indication information is used to indicate whether the SOR transmission container information element contains Carry the network selection policy information.
  • this embodiment is an implementation of the first communication device corresponding to the embodiment shown in Figure 2.
  • the terminal can access the network used to provide the target slice service through the received network selection policy information, so that it can use the service corresponding to the target slice.
  • the network side actively informs the terminal of the network selection strategy information, and the network side sends the network selection strategy information to the terminal (UE) through the network registration process.
  • the first communication device is the first core network device
  • the second communication device is the second core network device
  • the first core network device is the Visited Public Land Mobile Network (VPLMN) AMF
  • the second core network device It is the local public land mobile network (Home Public Land Mobile Network, HPLMN) UDM or roaming guidance application server (Steering of Roaming application function, SoR-AF).
  • the specific process is as follows:
  • Step (1) The terminal sends the first message to the first core network device
  • the first message contains at least one of the following:
  • Requested NSSAI used to indicate slices requested by one or more terminals
  • the location information of the UE includes the cell (Cell) identifier (Identifier, ID) or the tracking area identifier (Tracking Area Identity, TAI) or the UE location (location).
  • the UE location represents the location through location services (Location Services, LCS). ) The geographical location of the UE obtained by the architecture;
  • Slice-based SoR support indication (Slice-based SoR support indication) is used to indicate that the terminal supports network selection policy information.
  • One implementation method is to express it in the 5G mobility management capability (5GMM capability) information element.
  • 5GMM capability 5G mobility management capability
  • the first message may be a registration request message.
  • Step (2) After receiving the first message, the first core network device performs a first operation.
  • the first operation includes at least one of the following:
  • the requested slice is placed in the slice rejection message and sent to the terminal;
  • the first core network device triggers the second core network device to provide network selection to the terminal.
  • the first core network device Triggering the second core network device to provide the network selection policy information to the terminal;
  • the first core network device does not need to trigger the second core network device to provide network selection policy information to the terminal; when the second core network device confirms that it can When providing services for the slice requested by the terminal, the first core network device does not need to trigger the second core network device to provide network selection policy information to the terminal.
  • the network selection policy information includes at least one of the following:
  • UE ID indicating the identification of the terminal to which the network selection policy information applies
  • Public Land Mobile Network Public Land Mobile Network, PLMN ID list (list), including the identification of one or more public access networks. This is mainly information about other VPLMNs for terminals to use available slices when accessing;
  • NSSAI represents one or more slices available under the identity of each public access network
  • Network priority information represents the priority information of slices under the network
  • Access type indicating access type (Access type);
  • RAT Random Access Technology
  • the validity time information of the network selection policy information indicates the validity period of the current network selection policy information
  • Step (3) The first core network device sends a third message to the terminal, where the third message includes at least one of the following:
  • Allowed NSSAI indicating the slices accepted by the network side
  • One way to implement network selection policy information is to carry it to the terminal in the SOR TRANSPORT container.
  • the third message may be a registration accept message.
  • Step (4) After the terminal receives the third message, if the third message indicates that the terminal needs to reply a confirmation message to the first core network device, the terminal sends a confirmation message to the first core network device. Send a confirmation message (such as a registration complete message), which is used to confirm to the first core network device that the terminal has received the network selection policy information.
  • a confirmation message such as a registration complete message
  • Step (5) After receiving the network selection policy information, the terminal performs the second operation under the following conditions:
  • the network expects to use the target slice to access the network and/or establish a session, and the target slice belongs to the current network Rejecting the slice, the terminal performs the following actions:
  • the terminal checks whether the network selection policy information is within the validity period, and if it is within the validity period, performs subsequent operations; otherwise, the terminal performs a re-selection process;
  • the terminal selects a PLMN applicable to the target slice and attempts to initiate a network access process.
  • the terminal will preferentially access the PLMN network with higher network priority.
  • the terminal can follow the PLMN sequence in Embodiment 5. Sequential selection, that is, selecting the PLMN network for access in byte order and priority from high to low.
  • the first core network device after receiving the terminal's request, provides the terminal with slice-based network selection policy information according to network deployment.
  • the terminal actively inquires the network side for network selection policy information, and the network side sends the network selection policy information to the terminal through non-access stratum (Non-Access-Stratum, NAS) transmission (TRANSPORT) or registration process.
  • the first communication device is the first core network device
  • the second communication device is the second core network device
  • the first core network device is VPLMN AMF
  • the second core network device is HPLMN UDM or SoR-AF.
  • the specific process is as follows:
  • Steps (1)-(4) The terminal performs a registration operation with the first core network device and the second core network device, and the registration process is used to establish a service connection between the terminal and the network.
  • This embodiment is similar to Embodiment 1, except that steps (5)-(9) are actively triggered by the terminal to inquire about network selection policy information.
  • the network side may or may not issue the network selection policy information.
  • the terminal supports an active query function to actively ask the network side to select a network. Policy information.
  • Steps (5)-(6) Due to business requirements or user active selection, the target slice that the terminal expects to use is temporarily unavailable in the current network, then the terminal sends a second message to the first core network device, The second message may be used to query the network for network selection policy information associated with the target slice.
  • the target slice being temporarily unavailable in the current network includes at least one of the following situations:
  • the target slice belongs to the rejected slice of the terminal, and the associated timer is not 0;
  • the target slice is not in the configuration slice of the terminal
  • the first core network device informs the terminal in the third message that the current network does not support the target slice.
  • the second message includes at least one of the following:
  • Target slice used to represent the slice information that the terminal expects to use
  • the location information of the terminal including Cell ID and/or TAI and/or UE location, which refers to the geographical location of the UE obtained by the LCS architecture;
  • Query indication of network selection policy information (for example, Slice-based SOR information), used to indicate that the current message is used Query the network selection policy information associated with the target slice on the network side;
  • Requested NSSAI used to indicate one or more slices requested by the terminal
  • Slice-based SoR support indication is used to indicate that the terminal supports network selection policy information.
  • One implementation method is to express it in 5GMM capability.
  • the second message may be a UL NAS TRANSPORT message or a registration request (registration request) message.
  • the query instructions for the network selection policy information can be represented in a container (container).
  • the visited network is transparently transmitted, and only the network elements of the main network (for example, Access Management Function (AMF)) or unified database management
  • the network element Unified Data Management, UDM can be viewed.
  • the container can be an existing payload container or a new container.
  • Step (7) After receiving the second message from the terminal, the first core network device queries the second core network device for network selection policy information associated with the target slice.
  • the first core network device may encapsulate the second message in a container and transmit it transparently to the second core network device under the main network.
  • the second core network device under the main network replies the network selection policy information to the first core network device
  • the first core network device encapsulates the network selection policy information in a container and transmits it transparently to the terminal .
  • Step (8) The first core network device sends a third message to the terminal, where the third message is used to carry the network selection policy information.
  • the third message may be a downlink (DL) NAS TRANSPORT message or a registration accept (registration accept) message.
  • the network selection policy information can be represented in a container. It is transparently transmitted to the visited network and only the network elements of the main network (for example, AMF or UDM) can view it.
  • the container can be an existing payload container. It can also be a newly added container;
  • Step (9) After the terminal receives the third message, the terminal performs the following operations:
  • the terminal sends a confirmation message to the first core network device, and the confirmation message is used to Confirm to the network side that the terminal has received the network selection policy information.
  • the confirmation message can be a UL NAS transmission message or a registration completion message;
  • the terminal saves or updates the network selection policy information stored in the maintenance entity (Maintenance Entity, ME). ;
  • the terminal discards the network selection policy information in the third message
  • the terminal treats the current PLMN as a low-priority network.
  • the terminal actively queries the first core network device for slice-based network selection policy information based on service requirements.
  • the first communication device is a first core network device
  • the second communication device is a second core network device
  • the first core network device is VPLMN AMF
  • the second core network device is HPLMN UDM or SoR-AF.
  • the update of the network selection policy information is triggered by the network side.
  • Step (1) The network side triggers the terminal to update the network selection policy information of the VPLM slice.
  • Step (2) Due to network changes, the network selection policy information of the first core network device and the second core network device changes, then the first core network device sends a fourth message to the terminal, and the fourth message is To carry updated network selection policy information.
  • the fourth message may be a configuration update command message.
  • Step (3) After receiving the fourth message, the terminal sends a fifth message to the first core network device.
  • the fifth message is used to confirm to the network side that the terminal has received the network selection policy. information.
  • the fifth message may be a configuration update complete message.
  • Step (4) The terminal uses SOR slicing to select an appropriate VPLMN for service.
  • the first core network device updates slice-based network selection policy information for the terminal according to network changes.
  • the first indication information is carried in the 5G mobility management capability information element, and the first indication information is used to indicate whether the terminal supports network access based on the network selection policy information.
  • the 5G mobility management capability information element can add the following content:
  • SBSS Slice-based SoR support
  • Slice-based SoR support is a new part and carries the first instruction information.
  • SBSS Slice-based SoR support
  • Implementation Mode 1 The network selection policy information is carried in the SOR transmission container (transparent container).
  • the existing SOR transparent container can be enhanced and network selection policy information can be added to the existing SOR transparent container.
  • SBS and Slice-based SOR are added to the existing SOR transparent container.
  • Slice-based SOR is network selection strategy information.
  • the format of Slice-based SOR is shown in Figure 9.
  • Slice-based SOR includes the length of Slice-based SOR (Length of Slice-based SOR), S-NSSAI value (value) and PLMN ID and access technology list.
  • the above S-NSSAI value includes the length of S-NSSAI degree and content.
  • the S-NSSAI value is coded as the length and value part of the S-NSSAI information element starting with the second octet. octet).
  • PLMN ID and access technology list includes the length of PLMN ID and access technology list (Length of PLMN ID and access technology list), PLMN ID and access technology identifier.
  • the priorities of the PLMN ID and access technology identifier are provided in descending order, that is, PLMN ID 1 indicates the highest priority, and PLMN ID n indicates the lowest priority.
  • the PLMN ID and access technology list carries at least 0 and at most 16 PLMN ID and access technology identifier combinations.
  • Network selection policy information is carried in a new IE, which is a slice-based SOR container.
  • a new message type Slice-based SOR container is added to the Payload container type value, which is used by the network side to indicate that the network selection policy information has been carried to the UE in the container.
  • the Payload container type value can add the following content:
  • the slice-based SOR container information element is a new IE that carries the UE's request information and/or the network's reply information.
  • slice-based SOR container IE includes the length of Slice-based SOR container information element (Length of Slice-based SOR container IE), container header (Container header) and container value (Container value), among which, IEI Represents the identity of the information element.
  • the Container header includes a data type. When the data type is 0, it means that the UE requests the network side to provide network selection policy information for the target slice. At this time, the Container value is one or more of the target slices. As shown in Figure 14; when data type is 1, it means that the network side carries network selection policy information to the terminal. At this time, the container value is the Slice-based SOR element list in the format shown in Figure 15.
  • the format of the slice-based SOR container IE sent by the UE is as shown in Figure 14.
  • the UE requests the network side to provide network selection policy information for the target slice.
  • the format of the slice-based SOR container IE replied by the network side is shown in Figure 15.
  • the network selection policy information is sent to the terminal through the slice-based SOR container IE.
  • slice-based SOR container IE includes Length of Slice-based SOR information IE, Container header and Slice-based SOR element.
  • Slice-based SOR element includes Length of Slice-based SOR element, S-NSSAI and PLMN ID and access technology list.
  • the above-mentioned S-NSSAI includes the length and content of the S-NSSAI.
  • the format of PLMN ID and access technology list is shown in Figure 17.
  • PLMN ID and access technology list includes Length of PLMN ID and access technology list, PLMN ID and access technology identifier.
  • the priorities of the PLMN ID and access technology identifier are provided in descending order, that is, PLMN ID 1 indicates the highest priority, and PLMN ID n indicates the lowest priority.
  • the PLMN ID and access technology list carries at least 0 and at most 16 PLMN ID and access technology identifier combinations.
  • the execution subject may be a network access device.
  • a network access device executing a network access method is used as an example to illustrate the network access device provided by the embodiment of the present application.
  • Figure 18 is a structural diagram of a network access device provided by an embodiment of the present application.
  • a terminal includes the network access device.
  • the network access device 300 includes:
  • the first receiving module 301 is configured to receive network selection policy information, where the network selection policy information indicates at least one network used to provide a target slice service, and the target slice is a slice that the terminal expects to query and/or use;
  • the access module 302 is configured to perform network access based on the network selection policy information.
  • the device also includes:
  • a first sending module configured to send a first message to the first communication device, where the first message includes at least one of the following:
  • the location information of the terminal is the location information of the terminal.
  • the first indication information is used to indicate whether the terminal supports network access based on the network selection policy information.
  • the network selection policy information includes at least one of the following:
  • Radio access technology RAT Radio access technology
  • the first indication information is carried in a 5G mobility management capability information element and/or a target information element.
  • the access module is specifically used for:
  • the terminal desires to use the target slice to access the network and/or establish a session, and the target slice belongs to the rejected slice corresponding to the terminal, perform the following operations:
  • the terminal When the terminal detects that the network selection policy information includes the slice information of the target slice, the terminal selects the PLMN corresponding to the target slice in the network selection policy information for network access.
  • the device also includes:
  • a detection module configured to detect at the terminal that the network selection policy information satisfies the requirements corresponding to the network selection policy information. In the case of valid time information, it is detected whether the network selection policy information includes slice information of the target slice.
  • the terminal selects the PLMN corresponding to the target slice in the network selection policy information for network access, including:
  • the terminal selects a PLMN for network access based on the network priority information.
  • the network priority information includes PLMN identification priority and access technology identification priority.
  • the device also includes:
  • the second sending module is configured to send a second message to the first communication device, where the second message is used to query the network selection policy information.
  • the second sending module is specifically used for:
  • the terminal When the first condition is met, the terminal sends a second message to the first communication device;
  • the first condition includes at least one of the following:
  • the target slice belongs to the rejected slice corresponding to the terminal
  • the target slice does not belong to the configuration slice of the terminal
  • the first communication device indicates to the terminal that the target slice is not supported
  • the terminal desires to use the target slice.
  • the second message includes at least one of the following:
  • the location information of the terminal is the location information of the terminal.
  • a first message identifier is used to identify the second message for querying the network selection policy information
  • the first indication information is used to indicate whether the terminal supports network access based on the network selection policy information.
  • the first message identifier is carried in a slice-based first roaming guidance SOR container information element.
  • the first SOR container information element includes at least one of the following:
  • the first container header includes the first message identifier, and the first message identifier is used to represent a request for the first communication device to provide the network selection policy information;
  • the first container value includes at least one Slice information of the target slice, the slice information includes slice length and slice content.
  • the first receiving module is specifically used for:
  • the device also includes:
  • a checking module configured to check the integrity of the third message and perform target operations based on the integrity check results.
  • the inspection module is specifically used for at least one of the following:
  • the network selection policy information in the third message is discarded.
  • the device also includes:
  • the second receiving module is configured to receive a fourth message sent by the first communication device when the network selection policy information is updated, where the fourth message carries the updated network selection policy information.
  • the device also includes:
  • a third sending module is configured to send a fifth message to the first communication device, where the fifth message is used to indicate confirmation of receipt of the updated network selection policy information.
  • the network selection policy information is represented by a second SOR container information element based on slices, and the second SOR container information element includes at least one of the following:
  • the second container header includes a second message identifier, and the second message identifier is used to represent that the first communication device provides the network selection policy information to the terminal;
  • the second container value includes at least A slice-based SOR element field, the SOR element field includes the length of the SOR element field, a PLMN identification and access technology list, and slice information of at least one of the target slices.
  • the network selection policy information is carried in a SOR transmission container information element.
  • the SOR transmission container information element includes second indication information.
  • the second indication information is used to indicate whether the SOR transmission container information element contains Carry the network selection policy information.
  • the first receiving module receives network selection policy information.
  • the network selection policy information indicates at least one network used to provide a target slice service.
  • the target slice is the terminal's desired query and /or slices used; the access module performs network access based on the network selection policy information. In this way, the terminal can access the network used to provide the target slice service through the received network selection policy information, so that it can use the service corresponding to the target slice.
  • the network access device in the embodiment of the present application may be an electronic device, such as an electronic device with an operating system, or may be a component in the electronic device, such as an integrated circuit or chip.
  • the electronic device may be a terminal or other devices other than the terminal.
  • terminals may include but are not limited to the types of terminals 11 listed above, and other devices may be servers, network attached storage (Network Attached Storage, NAS), etc.
  • NAS Network Attached Storage
  • the network access device provided by the embodiment of the present application can implement each process implemented by the method embodiment in Figure 2 and achieve the same technical effect. To avoid duplication, details will not be described here.
  • the execution subject may be a network access device.
  • a network access device executing a network access method is used as an example to illustrate the network access device provided by the embodiment of the present application.
  • Figure 19 is a structural diagram of a network access device provided by an embodiment of the present application.
  • the first communication device includes the network access device.
  • the network access device 400 includes:
  • the first sending module 401 is configured to send network selection policy information to the terminal.
  • the network selection policy information indicates at least one network used to provide a target slice service.
  • the target slice is a slice that the terminal desires to query and/or use. ;
  • the network selection policy information is used for the terminal to access the network.
  • the device also includes:
  • a first receiving module configured to receive a first message sent by the terminal, where the first message includes at least one of the following:
  • the location information of the terminal is the location information of the terminal.
  • the first indication information is used to indicate whether the terminal supports network access based on the network selection policy information.
  • the device also includes:
  • Execution module used to perform a first operation, the first operation includes at least one of the following:
  • the second communication device When the first message carries the target slice, and the target slice belongs to the rejection slice corresponding to the terminal, the second communication device is triggered to provide the network selection policy information to the terminal.
  • the network selection policy information includes at least one of the following:
  • Radio access technology RAT Radio access technology
  • the device also includes:
  • the second receiving module is configured to receive a second message sent by the terminal, where the second message is used to query the network selection policy information.
  • the second message includes at least one of the following:
  • the location information of the terminal is the location information of the terminal.
  • a first message identifier is used to identify the second message for querying the network selection policy information
  • the first indication information is used to indicate whether the terminal supports network access based on the network selection policy information.
  • the first message identifier is carried in a slice-based first roaming guidance SOR container information element.
  • the first SOR container information element includes at least one of the following:
  • the first container header includes the first message identifier, and the first message identifier is used to represent a request for the first communication device to provide the network selection policy information;
  • the first container value includes at least one Slice information of the target slice, the slice information includes slice length and slice content.
  • the device also includes:
  • the second sending module is configured to send a query message to the second communication device based on the second message, where the query message is used to query the network selection policy information.
  • the device also includes:
  • a third sending module is configured to send a fourth message to the terminal when the network selection policy information is updated, where the fourth message carries the updated network selection policy information.
  • the device also includes:
  • the third receiving module is configured to receive a fifth message sent by the terminal, where the fifth message is used to indicate confirmation of receipt of the updated network selection policy information.
  • the network selection policy information is represented by a second SOR container information element based on slices, and the second SOR container information element includes at least one of the following:
  • the second container header includes a second message identifier, and the second message identifier is used to represent that the first communication device provides the network selection policy information to the terminal;
  • the second container value includes at least A slice-based SOR element field, the SOR element field includes the length of the SOR element field, a PLMN identification and access technology list, and slice information of at least one of the target slices.
  • the network selection policy information is carried in a SOR transmission container information element.
  • the SOR transmission container information element includes second indication information.
  • the second indication information is used to indicate whether the SOR transmission container information element contains Carry the network selection policy information.
  • the first sending module sends network selection policy information to the terminal.
  • the network selection policy information indicates at least one network used to provide a target slice service.
  • the target slice is what the terminal expects.
  • the terminal can access the network used to provide the target slice service through the received network selection policy information, so that it can use the service corresponding to the target slice.
  • the network access device in the embodiment of the present application may be an electronic device, such as an electronic device with an operating system, or may be a component in the electronic device, such as an integrated circuit or chip.
  • the electronic device may be a terminal or other devices other than the terminal.
  • terminals may include but are not limited to the types of terminals 11 listed above, and other devices may be servers, network attached storage (Network Attached Storage, NAS), etc., which are not specifically limited in the embodiment of this application.
  • NAS Network Attached Storage
  • the network access device provided by the embodiment of the present application can implement each process implemented by the method embodiment in Figure 3 and achieve the same technical effect. To avoid duplication, details will not be described here.
  • this embodiment of the present application also provides a communication device 500, which includes a processor 501 and a memory 502.
  • the memory 502 stores programs or instructions that can be run on the processor 501, such as , when the communication device 500 is a terminal, when the program or instruction is executed by the processor 501, each step of the above embodiment of the network access method applied to the terminal is implemented, and the same technical effect can be achieved.
  • the communication device 500 is a first communication device
  • the program or instruction is executed by the processor 501
  • each step of the above embodiment of the network access method applied to the first communication device is implemented, and the same technical effect can be achieved.
  • I won’t go into details here.
  • An embodiment of the present application also provides a terminal, including a processor and a communication interface, wherein the communication interface is used to receive network selection policy information, and the network selection policy information indicates at least one network used to provide target slicing services, so The target slice is a slice that the terminal expects to query and/or use; and the processor is configured to perform network access based on the network selection policy information.
  • This terminal embodiment corresponds to the above-mentioned network access method embodiment.
  • Each implementation process and implementation method of the above-mentioned network access method embodiment can be applied to this terminal embodiment, and can achieve the same technical effect.
  • FIG. 21 is a schematic diagram of the hardware structure of a terminal that implements an embodiment of the present application.
  • the terminal 600 includes but is not limited to: a radio frequency unit 601, a network module 602, an audio output unit 603, an input unit 604, a sensor 605, a display unit 606, a user input unit 607, an interface unit 608, a memory 609, a processor 610, etc. At least some parts.
  • the terminal 600 may also include a power supply (such as a battery) that supplies power to various components.
  • the power supply may be logically connected to the processor 610 through a power management system, thereby managing charging, discharging, and power consumption through the power management system. Management and other functions.
  • the terminal structure shown in FIG. 21 does not limit the terminal.
  • the terminal may include more or fewer components than shown in the figure, or some components may be combined or arranged differently, which will not be described again here.
  • the input unit 604 may include a graphics processing unit (GPU) 6041 and a microphone 6042.
  • the graphics processor 6041 is responsible for the image capture device (GPU) in the video capture mode or the image capture mode. Process the image data of still pictures or videos obtained by cameras (such as cameras).
  • the display unit 606 may include a display panel 6061, which may be configured in the form of a liquid crystal display, an organic light emitting diode, etc. Display panel 6061.
  • the user input unit 607 includes a touch panel 6071 and at least one of other input devices 6072 .
  • Touch panel 6071 also called touch screen.
  • the touch panel 6071 may include two parts: a touch detection device and a touch controller.
  • Other input devices 6072 may include but are not limited to physical keyboards, function keys (such as volume control keys, switch keys, etc.), trackballs, mice, and joysticks, which will not be described again here.
  • the radio frequency unit 601 after receiving downlink data from the network side device, can transmit it to the processor 610 for processing; in addition, the radio frequency unit 601 can send uplink data to the network side device.
  • the radio frequency unit 601 includes, but is not limited to, an antenna, an amplifier, a transceiver, a coupler, a low noise amplifier, a duplexer, etc.
  • Memory 609 may be used to store software programs or instructions as well as various data.
  • the memory 609 may mainly include a first storage area for storing programs or instructions and a second storage area for storing data, wherein the first storage area may store an operating system, an application program or instructions required for at least one function (such as a sound playback function, Image playback function, etc.) etc.
  • memory 609 may include volatile memory or non-volatile memory, or memory 609 may include both volatile and non-volatile memory.
  • non-volatile memory can be read-only memory (Read-Only Memory, ROM), programmable read-only memory (Programmable ROM, PROM), erasable programmable read-only memory (Erasable PROM, EPROM), electrically removable memory. Erase programmable read-only memory (Electrically EPROM, EEPROM) or flash memory.
  • Volatile memory can be random access memory (Random Access Memory, RAM), static random access memory (Static RAM, SRAM), dynamic random access memory (Dynamic RAM, DRAM), synchronous dynamic random access memory (Synchronous DRAM, SDRAM), double data rate synchronous dynamic random access memory (Double Data Rate SDRAM, DDRSDRAM), enhanced synchronous dynamic random access memory (Enhanced SDRAM, ESDRAM), synchronous link dynamic random access memory (Synch link DRAM) , SLDRAM) and direct memory bus random access memory (Direct Rambus RAM, DRRAM).
  • RAM Random Access Memory
  • SRAM static random access memory
  • DRAM dynamic random access memory
  • DRAM synchronous dynamic random access memory
  • SDRAM double data rate synchronous dynamic random access memory
  • Double Data Rate SDRAM Double Data Rate SDRAM
  • DDRSDRAM double data rate synchronous dynamic random access memory
  • Enhanced SDRAM, ESDRAM enhanced synchronous dynamic random access memory
  • Synch link DRAM synchronous link dynamic random access memory
  • SLDRAM direct memory bus
  • the processor 610 may include one or more processing units; optionally, the processor 610 integrates an application processor and a modem processor, where the application processor mainly handles operations related to the operating system, user interface, application programs, etc., Modem processors mainly process wireless communication signals, such as baseband processors. It can be understood that the above modem processor may not be integrated into the processor 610.
  • the radio frequency unit 601 is configured to receive network selection policy information, where the network selection policy information indicates at least one network used to provide a target slice service, and the target slice is a slice that the terminal desires to query and/or use;
  • the processor 610 is configured to perform network access based on the network selection policy information.
  • the radio frequency unit 601 is also used for:
  • the location information of the terminal is the location information of the terminal.
  • the first indication information is used to indicate whether the terminal supports network access based on the network selection policy information.
  • the network selection policy information includes at least one of the following:
  • Radio access technology RAT Radio access technology
  • the first indication information is carried in a 5G mobility management capability information element and/or a target information element.
  • processor 610 is also used to:
  • the terminal desires to use the target slice to access the network and/or establish a session, and the target slice belongs to the rejected slice corresponding to the terminal, perform the following operations:
  • the terminal When the terminal detects that the network selection policy information includes the slice information of the target slice, it selects the PLMN corresponding to the target slice in the network selection policy information for network access.
  • processor 610 is also used to:
  • the terminal When the terminal detects that the network selection policy information satisfies the valid time information corresponding to the network selection policy information, it detects whether the network selection policy information includes the slice information of the target slice.
  • processor 610 is also used to:
  • the network selection policy information includes network priority information
  • a PLMN is selected for network access based on the network priority information.
  • the network priority information includes PLMN identification priority and access technology identification priority.
  • the radio frequency unit 601 is also used for:
  • the radio frequency unit 601 is also used for:
  • the first condition includes at least one of the following:
  • the target slice belongs to the rejected slice corresponding to the terminal
  • the target slice does not belong to the configuration slice of the terminal
  • the first communication device indicates to the terminal that the target slice is not supported
  • the terminal desires to use the target slice.
  • the second message includes at least one of the following:
  • the location information of the terminal is the location information of the terminal.
  • a first message identifier is used to identify the second message for querying the network selection policy information
  • the first indication information is used to indicate whether the terminal supports network access based on the network selection policy information.
  • the first message identifier is carried in a slice-based first roaming guidance SOR container information element.
  • the first SOR container information element includes at least one of the following:
  • the first container header includes the first message identifier, and the first message identifier is used to represent a request for the first communication device to provide the network selection policy information;
  • the first container value includes at least one Slice information of the target slice, the slice information includes slice length and slice content.
  • the radio frequency unit 601 is also used for:
  • Processor 610 is also used to:
  • processor 610 is also used for at least one of the following:
  • the network selection policy information in the third message is discarded.
  • the radio frequency unit 601 is also used for:
  • a fourth message sent by the first communication device is received, where the fourth message carries the updated network selection policy information.
  • the radio frequency unit 601 is also used for:
  • the network selection policy information is represented by a second SOR container information element based on slices, and the second SOR container information element includes at least one of the following:
  • the second container header includes a second message identifier, and the second message identifier is used to represent that the first communication device provides the network selection policy information to the terminal;
  • the second container value includes at least A slice-based SOR element field, the SOR element field includes the length of the SOR element field, PLMN identification and access technology list and There is one less slice information of the target slice.
  • the network selection policy information is carried in a SOR transmission container information element.
  • the SOR transmission container information element includes second indication information.
  • the second indication information is used to indicate whether the SOR transmission container information element contains Carry the network selection policy information.
  • An embodiment of the present application also provides a communication device.
  • the communication device is a first communication device.
  • the first communication device may be a core network device, including a processor and a communication interface.
  • the communication interface is used to send a network selection policy to a terminal.
  • Information, the network selection policy information indicates at least one network used to provide a target slice service, the target slice is a slice that the terminal expects to query and/or use; wherein the network selection policy information is used for the terminal Perform network access.
  • This communication device embodiment corresponds to the above-mentioned network access method embodiment.
  • Each implementation process and implementation manner of the above-mentioned network access method embodiment can be applied to this communication device embodiment, and can achieve the same technical effect.
  • the communication device 700 includes: an antenna 701, a radio frequency device 702, a baseband device 703, a processor 704 and a memory 705.
  • the antenna 701 is connected to the radio frequency device 702 .
  • the radio frequency device 702 receives information through the antenna 701 and sends the received information to the baseband device 703 for processing.
  • the baseband device 703 processes the information to be sent and sends it to the radio frequency device 702.
  • the radio frequency device 702 processes the received information and then sends it out through the antenna 701.
  • the method performed by the communication device in the above embodiment can be implemented in the baseband device 703, which includes a baseband processor.
  • the baseband device 703 may include, for example, at least one baseband board, which is provided with multiple chips, as shown in FIG. 22 .
  • One of the chips is, for example, a baseband processor, which is connected to the memory 705 through a bus interface to call the memory 705 .
  • the communication device may also include a network interface 706, such as a common public radio interface (CPRI).
  • CPRI common public radio interface
  • the communication device 700 in the embodiment of the present application also includes: instructions or programs stored in the memory 705 and executable on the processor 704.
  • the processor 704 calls the instructions or programs in the memory 705 to execute the modules shown in Figure 19 The implementation method and achieve the same technical effect will not be repeated here to avoid repetition.
  • Embodiments of the present application also provide a readable storage medium.
  • Programs or instructions are stored on the readable storage medium.
  • the program or instructions are executed by a processor, each process of the above-mentioned network access method embodiment is implemented, and can To achieve the same technical effect, to avoid repetition, we will not repeat them here.
  • the processor is the processor in the terminal described in the above embodiment.
  • the readable storage medium may be non-volatile or non-transient.
  • Readable storage media may include computer-readable storage media, such as computer read-only memory ROM, random access memory RAM, magnetic disks or optical disks.
  • An embodiment of the present application further provides a chip.
  • the chip includes a processor and a communication interface.
  • the communication interface is coupled to the processor.
  • the processor is used to run programs or instructions to implement the above embodiments of the network access method. Each process can achieve the same technical effect. To avoid repetition, we will not go into details here.
  • chips mentioned in the embodiments of this application may also be called system-on-chip, system-on-a-chip, system-on-chip or system-on-chip, etc.
  • Embodiments of the present application further provide a computer program/program product.
  • the computer program/program product is stored in a storage medium.
  • the computer program/program product is executed by at least one processor to implement the above network access method.
  • Each process in the example can achieve the same technical effect. To avoid repetition, we will not repeat it here.
  • Embodiments of the present application also provide a network access system, including: a terminal and a first communication device.
  • the terminal can be used to perform the steps of the network access method applied to the terminal as described above.
  • the network side device can be used to The above steps of the network access method applied to the first communication device are performed.
  • the methods of the above embodiments can be implemented by means of software plus the necessary general hardware platform. Of course, it can also be implemented by hardware, but in many cases the former is better. implementation.
  • the technical solution of the present application can be embodied in the form of a computer software product that is essentially or contributes to related technologies.
  • the computer software product is stored in a storage medium (such as ROM/RAM, disk, CD), including several instructions to cause a terminal (which can be a mobile phone, computer, server, air conditioner, or network device, etc.) to execute the methods described in various embodiments of this application.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Databases & Information Systems (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

本申请公开了一种网络接入方法、装置、终端及通信设备,属于通信技术领域,本申请实施例的网络接入方法包括:终端接收选网策略信息,所述选网策略信息指示用于提供目标切片服务的至少一个网络,所述目标切片为所述终端期望查询和/或使用的切片;所述终端基于所述选网策略信息进行网络接入。

Description

网络接入方法、装置、终端及通信设备
相关申请的交叉引用
本申请主张在2022年8月18日在中国提交的中国专利申请No.202210996011.4的优先权,其全部内容通过引用包含于此。
技术领域
本申请属于通信技术领域,具体涉及一种网络接入方法、装置、终端及通信设备。
背景技术
目前,网络侧设备会为终端配置当前网络中终端允许使用的切片。然而,对于终端期望激活使用的切片,有可能在当前的网络中终端不可用,会导致终端无法使用该切片,从而无法使用该切片相应的服务。
发明内容
本申请实施例提供一种网络接入方法、装置、终端及通信设备,能够解决终端无法使用某些切片相应的服务的问题。
第一方面,提供了一种网络接入方法,包括:
终端接收选网策略信息,所述选网策略信息指示用于提供目标切片服务的至少一个网络,所述目标切片为所述终端期望查询和/或使用的切片;
所述终端基于所述选网策略信息进行网络接入。
第二方面,提供了一种网络接入方法,包括:
第一通信设备向终端发送选网策略信息,所述选网策略信息指示用于提供目标切片服务的至少一个网络,所述目标切片为所述终端期望查询和/或使用的切片;
其中,所述选网策略信息用于所述终端进行网络接入。
第三方面,提供了一种网络接入装置,终端包括所述网络接入装置,所述装置包括:
第一接收模块,用于接收选网策略信息,所述选网策略信息指示用于提供目标切片服务的至少一个网络,所述目标切片为所述终端期望查询和/或使用的切片;
接入模块,用于基于所述选网策略信息进行网络接入。
第四方面,提供了一种网络接入装置,第一通信设备包括所述网络接入装置,所述装置包括:
第一发送模块,用于向终端发送选网策略信息,所述选网策略信息指示用于提供目标切片服务的至少一个网络,所述目标切片为所述终端期望查询和/或使用的切片;
其中,所述选网策略信息用于所述终端进行网络接入。
第五方面,提供了一种终端,该终端包括处理器和存储器,所述存储器存储可在所述 处理器上运行的程序或指令,所述程序或指令被所述处理器执行时实现如第一方面所述的方法的步骤。
第六方面,提供了一种终端,包括处理器及通信接口,其中,所述通信接口用于接收选网策略信息,所述选网策略信息指示用于提供目标切片服务的至少一个网络,所述目标切片为所述终端期望查询和/或使用的切片;所述处理器用于基于所述选网策略信息进行网络接入。
第七方面,提供了一种通信设备,该通信设备为第一通信设备,该通信设备包括处理器和存储器,所述存储器存储可在所述处理器上运行的程序或指令,所述程序或指令被所述处理器执行时实现如第二方面所述的方法的步骤。
第八方面,提供了一种通信设备,该通信设备为第一通信设备,包括处理器及通信接口,所述通信接口用于向终端发送选网策略信息,所述选网策略信息指示用于提供目标切片服务的至少一个网络,所述目标切片为所述终端期望查询和/或使用的切片;其中,所述选网策略信息用于所述终端进行网络接入。
第九方面,提供了一种网络接入系统,包括:终端及第一通信设备,所述终端可用于执行如第一方面所述的网络接入方法的步骤,所述第一通信设备可用于执行如第二方面所述的网络接入方法的步骤。
第十方面,提供了一种可读存储介质,所述可读存储介质上存储程序或指令,所述程序或指令被处理器执行时实现如第一方面所述的方法的步骤,或者实现如第二方面所述的方法的步骤。
第十一方面,提供了一种芯片,所述芯片包括处理器和通信接口,所述通信接口和所述处理器耦合,所述处理器用于运行程序或指令,实现如第一方面所述的方法,或实现如第二方面所述的方法。
第十二方面,提供了一种计算机程序/程序产品,所述计算机程序/程序产品被存储在存储介质中,所述计算机程序/程序产品被至少一个处理器执行以实现如第一方面所述的方法的步骤,或实现如第二方面所述的方法。
在本申请实施例中,终端接收选网策略信息,所述选网策略信息指示用于提供目标切片服务的至少一个网络,所述目标切片为所述终端期望查询和/或使用的切片;所述终端基于所述选网策略信息进行网络接入。这样,终端能够通过接收到的选网策略信息接入用于提供目标切片服务的网络,从而能够使用该目标切片相应的服务。
附图说明
图1是本申请实施例可应用的一种无线通信系统的框图;
图2是本申请实施例提供的一种网络接入方法的流程图;
图3是本申请实施例提供的另一种网络接入方法的流程图;
图4是本申请实施例提供的另一种网络接入方法的流程图;
图5是本申请实施例提供的另一种网络接入方法的流程图;
图6是本申请实施例提供的另一种网络接入方法的流程图;
图7是本申请实施例提供的一种信息元素的格式示意图;
图8是本申请实施例提供的另一种信息元素的格式示意图;
图9是本申请实施例提供的另一种信息元素的格式示意图;
图10是本申请实施例提供的另一种信息元素的格式示意图;
图11是本申请实施例提供的另一种信息元素的格式示意图;
图12是本申请实施例提供的另一种信息元素的格式示意图;
图13是本申请实施例提供的另一种信息元素的格式示意图;
图14是本申请实施例提供的另一种信息元素的格式示意图;
图15是本申请实施例提供的另一种信息元素的格式示意图;
图16是本申请实施例提供的另一种信息元素的格式示意图;
图17是本申请实施例提供的另一种信息元素的格式示意图;
图18是本申请实施例提供的一种网络接入装置的结构图;
图19是本申请实施例提供的另一种网络接入装置的结构图;
图20是本申请实施例提供的一种通信设备的结构示意图;
图21是本申请实施例提供的一种终端的结构示意图;
图22是本申请实施例提供的另一种通信设备的结构示意图。
具体实施方式
下面将结合本申请实施例中的附图,对本申请实施例中的技术方案进行清楚描述,显然,所描述的实施例是本申请一部分实施例,而不是全部的实施例。基于本申请中的实施例,本领域普通技术人员所获得的所有其他实施例,都属于本申请保护的范围。
本申请的说明书和权利要求书中的术语“第一”、“第二”等是用于区别类似的对象,而不用于描述特定的顺序或先后次序。应该理解这样使用的术语在适当情况下可以互换,以便本申请的实施例能够以除了在这里图示或描述的那些以外的顺序实施,且“第一”、“第二”所区别的对象通常为一类,并不限定对象的个数,例如第一对象可以是一个,也可以是多个。此外,说明书以及权利要求中“和/或”表示所连接对象的至少其中之一,字符“/”一般表示前后关联对象是一种“或”的关系。
值得指出的是,本申请实施例所描述的技术不限于长期演进型(Long Term Evolution,LTE)/LTE的演进(LTE-Advanced,LTE-A)系统,还可用于其他无线通信系统,诸如码分多址(Code Division Multiple Access,CDMA)、时分多址(Time Division Multiple Access,TDMA)、频分多址(Frequency Division Multiple Access,FDMA)、正交频分多址(Orthogonal Frequency Division Multiple Access,OFDMA)、单载波频分多址(Single-carrier Frequency Division Multiple Access,SC-FDMA)和其他系统。本申请实施例中的术语“系统”和“网 络”常被可互换地使用,所描述的技术既可用于以上提及的系统和无线电技术,也可用于其他系统和无线电技术。以下描述出于示例目的描述了新空口(New Radio,NR)系统,并且在以下大部分描述中使用NR术语,但是这些技术也可应用于NR系统应用以外的应用,如第6代(6th Generation,6G)通信系统。
图1示出本申请实施例可应用的一种无线通信系统的框图。无线通信系统包括终端11和网络侧设备12。其中,终端11可以是手机、平板电脑(Tablet Personal Computer)、膝上型电脑(Laptop Computer)或称为笔记本电脑、个人数字助理(Personal Digital Assistant,PDA)、掌上电脑、上网本、超级移动个人计算机(ultra-mobile personal computer,UMPC)、移动上网装置(Mobile Internet Device,MID)、增强现实(augmented reality,AR)/虚拟现实(virtual reality,VR)设备、机器人、可穿戴式设备(Wearable Device)、车载设备(Vehicle User Equipment,VUE)、行人终端(Pedestrian User Equipment,PUE)、智能家居(具有无线通信功能的家居设备,如冰箱、电视、洗衣机或者家具等)、游戏机、个人计算机(personal computer,PC)、柜员机或者自助机等终端侧设备,可穿戴式设备包括:智能手表、智能手环、智能耳机、智能眼镜、智能首饰(智能手镯、智能手链、智能戒指、智能项链、智能脚镯、智能脚链等)、智能腕带、智能服装等。需要说明的是,在本申请实施例并不限定终端11的具体类型。网络侧设备12可以包括接入网设备或核心网设备,其中,接入网设备也可以称为无线接入网设备、无线接入网(Radio Access Network,RAN)、无线接入网功能或无线接入网单元。接入网设备可以包括基站、无线局域网(Wireless Local Area Network,WLAN)接入点或WiFi节点等,基站可被称为节点B、演进节点B(eNB)、接入点、基收发机站(Base Transceiver Station,BTS)、无线电基站、无线电收发机、基本服务集(Basic Service Set,BSS)、扩展服务集(Extended Service Set,ESS)、家用B节点、家用演进型B节点、发送接收点(Transmitting Receiving Point,TRP)或所述领域中其他某个合适的术语,只要达到相同的技术效果,所述基站不限于特定技术词汇,需要说明的是,在本申请实施例中仅以NR系统中的基站为例进行介绍,并不限定基站的具体类型。核心网设备可以包含但不限于如下至少一项:核心网节点、核心网功能、移动管理实体(Mobility Management Entity,MME)、接入移动管理功能(Access and Mobility Management Function,AMF)、会话管理功能(Session Management Function,SMF)、用户平面功能(User Plane Function,UPF)、策略控制功能(Policy Control Function,PCF)、策略与计费规则功能单元(Policy and Charging Rules Function,PCRF)、边缘应用服务发现功能(Edge Application Server Discovery Function,EASDF)、统一数据管理(Unified Data Management,UDM),统一数据仓储(Unified Data Repository,UDR)、归属用户服务器(Home Subscriber Server,HSS)、集中式网络配置(Centralized network configuration,CNC)、网络存储功能(Network Repository Function,NRF),网络开放功能(Network Exposure Function,NEF)、本地NEF(Local NEF,或L-NEF)、绑定支持功能(Binding Support Function,BSF)、应用功能(Application Function,AF)等。需要说明的是,在本申请实施例中仅以 NR系统中的核心网设备为例进行介绍,并不限定核心网设备的具体类型。终端可以为用户设备(User Equipment,UE)。
为了便于更好地理解本申请实施例,下面先介绍以下技术点。
(1)切片的允许和拒绝
在注册流程中,首先UE会发送注册请求消息给网络侧,UE会将请求的切片(例如,请求的(requested)网络切片选择辅助信息(Network Slice Selection Assistance Information,NSSAI))上报给网络,requested NSSAI中包含一个或多个单个网络切片选择辅助信息(Single-Network Slice Selection Assistance Information,NSSAI),网络根据UE签约情况以及当前网络状况,判断是否允许为requested S-NSSAI提供服务。如果可以为requested S-NSSAI提供服务,则将该S-NSSAI放入允许的(allowed)NSSAI中回复给UE;如果无法为requested NSSAI提供服务,则将该S-NSSAI放入拒绝的(rejected)NSSAI中回复给UE。可选的,如果UE在注册请求消息中的5G移动性管理能力信息元素(5G mobility management capability Information Elements,5GMM capability IE)中指示支持扩展的(extended)rejected NSSAI,那么网络侧还会将无法服务的切片放入extended rejected NSSAI中回复给UE。
下面结合附图,通过一些实施例及其应用场景对本申请实施例提供的网络接入方法、装置、终端及通信设备进行详细地说明。
参见图2,图2是本申请实施例提供的一种网络接入方法的流程图,如图2所示,网络接入方法包括以下步骤:
步骤101、终端接收选网策略信息,所述选网策略信息指示用于提供目标切片服务的至少一个网络,所述目标切片为所述终端期望查询和/或使用的切片。
其中,选网策略信息也可以称为漫游选网信息,或者基于切片的漫游选网信息,或者漫游选网策略信息,或者基于切片的漫游选网策略信息,等等。
一种实施方式中,终端接收选网策略信息,可以是,终端接收第一通信设备或第二通信设备发送的选网策略信息。
一种实施方式中,终端接收选网策略信息,可以是,终端接收目标切片关联的选网策略信息。
一种实施方式中,终端接收选网策略信息,可以是,终端接收第一通信设备发送的目标切片关联的选网策略信息。
一种实施方式中,所述选网策略信息携带在下行(Downlink,DL)非接入层(non-access-stratum,NAS)传输消息中,或者注册接受消息中。
一种实施方式中,所述选网策略信息的传输方式为:封装在容器中进行透传。
一种实施方式中,所述选网策略信息携带在漫游引导(Steering of Roaming,SOR)传输容器中进行透传。
步骤102、所述终端基于所述选网策略信息进行网络接入。
其中,所述终端可以基于所述选网策略信息指示的至少一个网络进行网络接入。示例地,选网策略信息可以包括一个或多个用于提供所述目标切片服务的公共陆地移动网络(Public Land Mobile Network,PLMN)的标识,终端可以从该一个或多个PLMN中选择PLMN进行网络接入;和/或,选网策略信息可以包括该至少一个网络的网络优先级信息,终端可以基于该网络优先级信息从该至少一个网络中选择网络进行接入;和/或,选网策略信息可以包括网络接入类型,终端可以从该至少一个网络中选择网络按照该网络接入类型进行网络接入;等等。
需要说明的是,网络侧会在当前网络中允许提供服务的切片,对于UE希望激活使用的切片,如果在邻近或者其他网络中是可用的,而在当前的网络中不可用,相关技术中,当前网络不会向终端提供。对于UE希望激活使用的切片,在邻近或者其他网络中是可用的,相关机制不支持网络将哪个网络是可用的等信息告诉终端。本申请实施例中,通过终端接收选网策略信息,并基于选网策略信息进行网络接入,从而UE支持转去可以提供服务的网络进行注册,并且尝试激活服务。本申请实施例提供了一种网络将基于切片的选网策略信息告知给终端,以解决终端无法灵活地根据业务需求注册到相应网络的问题。本申请实施例解决了当前网络无法为终端提供其他网络中切片的问题,使得终端能够根据业务更灵活地选择切片,接入合适的网络以及接入服务。
在本申请实施例中,终端接收选网策略信息,所述选网策略信息指示用于提供目标切片服务的至少一个网络,所述目标切片为所述终端期望查询和/或使用的切片;所述终端基于所述选网策略信息进行网络接入。这样,终端能够通过接收到的选网策略信息接入用于提供目标切片服务的网络,从而能够使用该目标切片相应的服务。
可选地,所述终端接收选网策略信息之前,所述方法还包括:
所述终端向第一通信设备发送第一消息,所述第一消息包括如下至少一项:
所述终端的位置信息;
第一指示信息,所述第一指示信息用于指示所述终端是否支持基于所述选网策略信息进行网络接入。
其中,第一通信设备可以为第一核心网设备,具体的,第一通信设备可以为当前终端所在网络下的第一核心网设备。示例地,第一通信设备可以为AMF。第一消息还可以包括目标切片的切片信息。目标切片可以是所述终端请求的一个或多个切片。第一消息可以为注册请求(registration request)消息。终端的位置信息可以包括小区(Cell)标识(Identifier,ID),或者跟踪区域标识(Tracking Area Identity,TAI),或者UE位置(location),该UE location表示通过位置服务(Location Services,LCS)架构获取的UE的地理位置。
另外,第一指示信息可以为基于切片的SoR支持指示(Slice-based SoR support indication),可以用于指示所述终端是否支持选网策略信息。
另外,第一通信设备接收到所述终端发送的第一消息之后,第一通信设备可以执行第一操作,所述第一操作包括如下至少一项:确定所述终端是否支持基于所述选网策略信息 进行网络接入;在所述终端发送的消息未携带所述目标切片,且所述终端的签约切片均不能提供服务的情况下,触发第二通信设备向所述终端提供所述选网策略信息;在所述终端携带了所述目标切片,且所述请求的切片均属于拒绝切片的情况下,即在如果当前网络无法给终端请求的切片提供服务的情况下,则触发第二核心网设备向所述终端提供所述选网策略信息。从而第一通信设备能够基于接收到的第一消息触发第二通信设备向所述终端提供所述选网策略信息。
该实施方式中,终端向第一通信设备发送第一消息,从而第一通信设备能够基于第一消息中的终端的位置信息确定用于为终端提供目标切片服务的网络;第一通信设备能够基于第一消息中的第一指示信息确定终端是否支持基于选网策略信息进行网络接入,从而确定是否为终端提供选网策略信息。
可选地,所述选网策略信息包括如下至少一项:
终端标识;
用于提供所述目标切片服务的公共陆地移动网络PLMN的标识;
所述目标切片的切片信息;
网络优先级信息;
网络接入类型;
无线接入技术(Radio Access Technology,RAT);
选网策略信息的有效时间信息。
其中,终端标识(例如,UE ID)可以用于表示该选网策略信息适用的终端的标识。用于提供所述目标切片服务的PLMN的标识,可以包括一个或多个PLMN的标识。目标切片的切片信息可以包括NSSAI。网络优先级信息可以用于表示至少一个网络的优先级,和/或,网络下切片的优先级。示例地,网络优先级信息包括:针对同一个切片,不同的网络对应的优先级,优先级越高表示终端会优先选择该网络进行接入。网络接入类型可以包括3GPP接入类型(access type)或非3GPP(non-3GPP)access type等。无线接入技术(Radio Access Technology,RAT)可以包括NR、LTE或者通用陆地无线接入网(Universal Terrestrial Radio Access Network,UTRAN)等接入技术。选网策略信息的有效时间信息,可以包括选网策略信息的有效时间,或者选网策略信息的有效时长,或者,选网策略信息的有效期。
可选地,所述第一指示信息携带在5G移动性管理能力信息元素和/或目标信息元素中。
其中,可以在5G移动性管理能力信息元素中新增指示(indication),该新增指示用于携带第一指示信息。示例地,该新增指示可以为基于切片的SoR支持(Slice-based SoR support,SBSS)。在第一指示信息取值为第一预设值时,指示终端不支持基于所述选网策略信息进行网络接入;在第一指示信息取值为第二预设值时,指示终端支持基于所述选网策略信息进行网络接入。示例地,在第一指示信息取值为0时,指示终端不支持基于所述选网策略信息进行网络接入;在第一指示信息取值为1时,指示终端支持基于所述选网策 略信息进行网络接入。
另外,第一指示信息可以携带在目标信息元素中,该目标信息元素可以为5G移动性管理能力信息元素以外的其他现有的信息元素,或者该目标信息元素可以为新增信息元素。示例地,该目标信息元素可以为新增IE,该新增IE为基于切片的SOR容器(Slice-based SOR container)IE。
可选地,所述终端基于所述选网策略信息进行网络接入,包括:
在所述终端期望使用所述目标切片接入网络和/或建立会话,且所述目标切片属于所述终端对应的拒绝切片的情况下,所述终端执行如下操作:
在所述终端检测到所述选网策略信息中包括所述目标切片的切片信息的情况下,所述终端选择所述选网策略信息中与所述目标切片对应的PLMN进行网络接入。
其中,目标切片对应的PLMN,可以是目标切片属于该PLMN下可用的切片。在所述选网策略信息中包括网络优先级信息的情况下,所述终端可以基于所述网络优先级信息选择PLMN进行网络接入。在所述选网策略信息中不包括网络优先级信息的情况下,所述终端可以按照预设选取规则(例如,默认选择第一个)选择PLMN进行网络接入。在所述终端检测到所述选网策略信息中不包括所述目标切片的切片信息的情况下,终端可以执行重新选网流程。
该实施方式中,在所述终端期望使用所述目标切片接入网络和/或建立会话,且所述目标切片属于所述终端对应的拒绝切片的情况下,若所述终端检测到所述选网策略信息中包括所述目标切片的切片信息,则所述终端选择所述选网策略信息中与所述目标切片对应的PLMN进行网络接入,从而终端接入的PLMN能够为终端提供目标切片服务。
可选地,所述在所述终端检测到所述选网策略信息中包括所述目标切片的切片信息的情况下,所述终端选择所述选网策略信息中与所述目标切片对应的PLMN进行网络接入之前,所述方法还包括:
在所述终端检测到所述选网策略信息满足所述选网策略信息对应的有效时间信息的情况下,所述终端检测所述选网策略信息中是否包括所述目标切片的切片信息。
其中,所述选网策略信息对应的有效时间信息可以包括选网策略信息的有效期,在所述终端检测到所述选网策略信息处于有效期的情况下,所述终端检测所述选网策略信息中是否包括所述目标切片的切片信息。在所述终端检测到所述选网策略信息不满足所述选网策略信息对应的有效时间信息的情况下,终端可以执行重新选网流程。
该实施方式中,在所述终端检测到所述选网策略信息满足所述选网策略信息对应的有效时间信息的情况下,所述终端检测所述选网策略信息中是否包括所述目标切片的切片信息,从而能够在选网策略信息处于有效状态下基于选网策略信息进行网络接入。
可选地,所述终端选择所述选网策略信息中与所述目标切片对应的PLMN进行网络接入,包括:
在所述选网策略信息中包括网络优先级信息的情况下,所述终端基于所述网络优先级 信息选择PLMN进行网络接入。
其中,网络优先级信息可以包括选网策略信息中的一个或多个PLMN的优先级,终端可以选择选网策略信息中优先级最高的PLMN进行网络接入。
该实施方式中,在所述选网策略信息中包括网络优先级信息的情况下,所述终端基于所述网络优先级信息选择PLMN进行网络接入,这样,终端能够选择较高优先级的PLMN进行网络接入。
可选地,所述网络优先级信息包括PLMN标识优先级及接入技术标识优先级。
其中,网络优先级信息可以携带在PLMN标识及接入技术列表(PLMN ID and access technology list)中。PLMN标识(PLMN ID)优先级和接入技术标识(access technology identifier)的优先级在PLMN ID and access technology list中可以是以降序的形式表示,示例地,PLMN ID and access technology list中包括PLMN ID 1至PLMN ID n总共n个PLMN ID,PLMN ID 1指示最高优先级,PLMN ID n指示最低优先级。终端可以选择优先级最高的PLMN ID对应的PLMN进行网络接入。
可选地,所述终端接收选网策略信息之前,所述方法还包括:
所述终端向第一通信设备发送第二消息,所述第二消息用于查询所述选网策略信息。
其中,终端接收选网策略信息,可以是,终端接收第一通信设备发送的选网策略信息。
该实施方式中,所述终端向所述第一通信设备发送第二消息,所述第二消息用于查询所述选网策略信息,从而第一通信设备能够基于终端的查询向终端提供所述选网策略信息。
可选地,所述终端向第一通信设备发送第二消息,包括:
在满足第一条件的情况下,所述终端向第一通信设备发送第二消息;
其中,所述第一条件包括如下至少一项:
所述目标切片属于所述终端对应的拒绝切片;
所述目标切片不属于所述终端的配置切片;
所述第一通信设备向所述终端指示不支持所述目标切片;
所述终端期望使用所述目标切片。
另外,第一条件可以包括所述目标切片属于所述终端对应的拒绝切片,且该目标切片关联的计时器不为0。对于每一个属于拒绝切片的切片均关联一个计时器,在计时器的值为0时,该切片属于拒绝切片的状态无效;在计时器的值不为0时,该切片属于拒绝切片的状态有效。示例地,如果计时器的值为0或者无效值(例如,负值),则终端不会将该切片视为拒绝切片。目标切片不属于所述终端的配置切片,可以是,目标切片不在所述终端的配置切片中。
可选地,所述第二消息包括如下至少一项:
所述目标切片的切片信息;
所述终端的位置信息;
第一消息标识,所述第一消息标识用于标识所述第二消息用于查询所述选网策略信息;
第一指示信息,所述第一指示信息用于指示所述终端是否支持基于所述选网策略信息进行网络接入。
其中,终端的位置信息可以包括Cell ID,或TAI,或者UE位置(location),该UE location表示通过LCS架构获取的UE的地理位置。该第一消息标识可以为选网策略信息(例如,Slice-based SOR信息)的查询指示,用于指示当前消息用于查询网络侧所述选网策略信息。
另外,第二消息可以为上行(Uplink,UL)NAS TRANSPORT消息或者注册请求(registration request)消息。
该实施方式中,通过第二消息中的目标切片的切片信息,终端能够告知网络侧期望查询和/或使用的切片;通过第二消息中的终端的位置信息,能够便于网络侧根据该终端的位置信息为终端提供选网策略信息;通过第二消息中的第一消息标识,终端能够告知网络侧该第二消息用于查询所述选网策略信息;通过第二消息中的第一指示信息,终端能够告知网络侧是否支持基于所述选网策略信息进行网络接入。
可选地,所述第一消息标识携带在基于切片的第一漫游引导SOR容器信息元素中。
其中,该第一SOR容器信息元素可以为新增信息元素,该用于携带第一消息标识的新增信息元素可以命名为第一SOR容器信息元素,还可以设置其他命名,例如,基于切片的SOR容器信息元素(Slice-based SOR container),等等,本实施例对此不进行限定。
可选地,所述第一SOR容器信息元素包括如下至少一项:
第一SOR容器信息元素的标识;
第一SOR容器信息元素的长度;
第一容器头;
第一容器值;
其中,所述第一容器头中包括所述第一消息标识,所述第一消息标识用于表征请求所述第一通信设备提供所述选网策略信息;所述第一容器值包括至少一个所述目标切片的切片信息,所述切片信息包括切片长度和切片内容。
可选地,所述终端接收选网策略信息,包括:
终端通过第三消息接收第一通信设备发送的选网策略信息;
所述方法还包括:
所述终端对所述第三消息进行完整性检查,基于完整性检查结果执行目标操作。
其中,所述第三消息可以包括选网策略信息。
该实施方式中,终端通过第三消息接收第一通信设备发送的选网策略信息,所述终端对所述第三消息进行完整性检查,基于完整性检查结果执行目标操作,这样,能够通过完整性检查确定第三消息是否完整。
可选地,所述基于完整性检查结果执行目标操作,包括如下至少一项:
在所述完整性检查结果指示所述第三消息完整的情况下,所述终端向所述第一通信设 备发送确认消息,所述确认消息用于指示确认接收到所述选网策略信息;
在所述完整性检查结果指示所述第三消息完整的情况下,所述终端存储所述第三消息中的选网策略信息;或者,在所述完整性检查结果指示所述第三消息完整的情况下,所述终端基于所述第三消息中的选网策略信息更新已存储的选网策略信息;
在所述完整性检查结果指示所述第三消息不完整的情况下,所述终端丢弃所述第三消息中的选网策略信息。
一种实施方式中,在所述完整性检查结果指示所述第三消息完整,且所述第三消息指示终端需要向第一通信设备回复确认消息的情况下,所述终端向所述第一通信设备发送确认消息。该确认消息可以为UL NAS传输消息或注册完成消息。
可选地,所述方法还包括:
在所述选网策略信息发生更新的情况下,所述终端接收第一通信设备发送的第四消息,所述第四消息中携带更新后的选网策略信息。
其中,该第四消息可以为配置更新命令(configuration update command)消息。终端接收选网策略信息,可以是,终端接收第一通信设备发送的选网策略信息。
该实施方式中,在所述选网策略信息发生更新的情况下,所述终端接收第一通信设备发送的第四消息,所述第四消息中携带更新后的选网策略信息,从而终端能够基于更新后的选网策略信息进行网络接入。
可选地,所述终端接收第一通信设备发送的第四消息之后,所述方法还包括:
所述终端向所述第一通信设备发送第五消息,所述第五消息用于指示确认接收到所述更新后的选网策略信息。
其中,该第五消息可以为配置更新完成(configuration update complete)消息。
可选地,所述选网策略信息通过基于切片的第二SOR容器信息元素表征,所述第二SOR容器信息元素包括如下至少一项:
第二SOR容器信息元素的标识;
第二SOR容器信息元素的长度;
第二容器头;
第二容器值;
其中,所述第二容器头中包括第二消息标识,所述第二消息标识用于表征所述第一通信设备向所述终端提供所述选网策略信息;所述第二容器值包括至少一个基于切片的SOR元素域,所述SOR元素域包括所述SOR元素域的长度、PLMN标识及接入技术列表及至少一个所述目标切片的切片信息。
另外,该第二SOR容器信息元素可以为新增信息元素,该用于携带选网策略信息的新增信息元素可以命名为第二SOR容器信息元素,还可以设置其他命名,例如,基于切片的SOR容器信息元素(Slice-based SOR container),等等,本实施例对此不进行限定。第二容器值包括至少一个基于切片的SOR元素域(Slice-based SOR element)。PLMN标识 及接入技术列表(PLMN ID and access technology list)中包括PLMN ID 1至PLMN ID n总共n个PLMN ID,PLMN ID 1指示最高优先级,PLMN ID n指示最低优先级。示例地,PLMN ID and access technology list至少携带0个PLMN ID和access technology identifier组合,至多携带16个PLMN ID和access technology identifier组合。
可选地,所述选网策略信息携带在SOR传输容器信息元素中,所述SOR传输容器信息元素包括第二指示信息,所述第二指示信息用于指示所述SOR传输容器信息元素中是否携带所述选网策略信息。
其中,第二指示信息可以为SOR传输容器信息元素中新增的指示信息,示例地,可以为SBS。第二指示信息可以用于指示所述SOR传输容器信息元素中携带所述选网策略信息,或者,指示所述SOR传输容器信息元素中不携带所述选网策略信息。示例地,在第二指示信息取值为第三预设值时,指示所述SOR传输容器信息元素中携带所述选网策略信息;在第二指示信息取值为第四预设值时,指示所述SOR传输容器信息元素中不携带所述选网策略信息。示例地,在第二指示信息取值为1时,指示所述SOR传输容器信息元素中携带所述选网策略信息;在第二指示信息取值为0时,指示所述SOR传输容器信息元素中不携带所述选网策略信息。
参见图3,图3是本申请实施例提供的一种网络接入方法的流程图,如图3所示,网络接入方法包括以下步骤:
步骤201、第一通信设备向终端发送选网策略信息,所述选网策略信息指示用于提供目标切片服务的至少一个网络,所述目标切片为所述终端期望查询和/或使用的切片;
其中,所述选网策略信息用于所述终端进行网络接入。
可选地,所述第一通信设备向终端发送选网策略信息之前,所述方法还包括:
所述第一通信设备接收所述终端发送的第一消息,所述第一消息包括如下至少一项:
所述终端的位置信息;
第一指示信息,所述第一指示信息用于指示所述终端是否支持基于所述选网策略信息进行网络接入。
可选地,所述第一通信设备接收所述终端发送的第一消息之后,所述方法还包括:
所述第一通信设备执行第一操作,所述第一操作包括如下至少一项:
确定所述终端是否支持基于所述选网策略信息进行网络接入;
在所述终端发送的消息未携带所述目标切片,且所述终端的签约切片均不能提供服务的情况下,触发第二通信设备向所述终端提供所述选网策略信息;
在所述第一消息携带所述目标切片,且所述目标切片属于所述终端对应的拒绝切片的情况下,触发第二通信设备向所述终端提供所述选网策略信息。
可选地,所述选网策略信息包括如下至少一项:
终端标识;
用于提供所述目标切片服务的公共陆地移动网络PLMN的标识;
所述目标切片的切片信息;
网络优先级信息;
网络接入类型;
无线接入技术RAT;
选网策略信息的有效时间信息。
可选地,所述第一通信设备向终端发送选网策略信息之前,所述方法还包括:
所述第一通信设备接收所述终端发送的第二消息,所述第二消息用于查询所述选网策略信息。
可选地,所述第二消息包括如下至少一项:
所述目标切片的切片信息;
所述终端的位置信息;
第一消息标识,所述第一消息标识用于标识所述第二消息用于查询所述选网策略信息;
第一指示信息,所述第一指示信息用于指示所述终端是否支持基于所述选网策略信息进行网络接入。
可选地,所述第一消息标识携带在基于切片的第一漫游引导SOR容器信息元素中。
可选地,所述第一SOR容器信息元素包括如下至少一项:
第一SOR容器信息元素的标识;
第一SOR容器信息元素的长度;
第一容器头;
第一容器值;
其中,所述第一容器头中包括所述第一消息标识,所述第一消息标识用于表征请求所述第一通信设备提供所述选网策略信息;所述第一容器值包括至少一个所述目标切片的切片信息,所述切片信息包括切片长度和切片内容。
可选地,所述第一通信设备接收所述终端发送的第二消息之后,所述方法还包括:
所述第一通信设备基于所述第二消息向第二通信设备发送查询消息,所述查询消息用于查询所述选网策略信息。
可选地,所述方法还包括:
在所述选网策略信息发生更新的情况下,所述第一通信设备向所述终端发送第四消息,所述第四消息中携带更新后的选网策略信息。
可选地,所述第一通信设备向所述终端发送第四消息之后,所述方法还包括:
所述第一通信设备接收所述终端发送的第五消息,所述第五消息用于指示确认接收到所述更新后的选网策略信息。
可选地,所述选网策略信息通过基于切片的第二SOR容器信息元素表征,所述第二SOR容器信息元素包括如下至少一项:
第二SOR容器信息元素的标识;
第二SOR容器信息元素的长度;
第二容器头;
第二容器值;
其中,所述第二容器头中包括第二消息标识,所述第二消息标识用于表征所述第一通信设备向所述终端提供所述选网策略信息;所述第二容器值包括至少一个基于切片的SOR元素域,所述SOR元素域包括所述SOR元素域的长度、PLMN标识及接入技术列表及至少一个所述目标切片的切片信息。
可选地,所述选网策略信息携带在SOR传输容器信息元素中,所述SOR传输容器信息元素包括第二指示信息,所述第二指示信息用于指示所述SOR传输容器信息元素中是否携带所述选网策略信息。
需要说明的是,本实施例作为与图2所示的实施例中对应的第一通信设备的实施方式,其具体的实施方式可以参见图2所示的实施例的相关说明,为避免重复说明,本实施例不再赘述。这样,终端能够通过接收到的选网策略信息接入用于提供目标切片服务的网络,从而能够使用该目标切片相应的服务。
下面通过五个具体的实施例对本申请实施例提供的网络接入方法进行说明:
实施例1:
在该实施例中,由网络侧主动告知终端选网策略信息,网络侧通过网络注册流程将选网策略信息发送给终端(UE)。第一通信设备为第一核心网设备,第二通信设备为第二核心网设备,第一核心网设备为拜访地公共陆地移动网络(Visited Public Land Mobile Network,VPLMN)AMF,第二核心网设备为本地公用陆地移动网络(Home Public Land Mobile Network,HPLMN)UDM或漫游引导应用服务器(Steering of Roaming application function,SoR-AF)。如图4所示,具体流程如下:
步骤(1):终端向第一核心网设备发送第一消息;
其中,所述第一消息包含以下至少一项:
请求的(Requested)NSSAI,用于指示一个或多个所述终端请求的切片;
UE的位置信息,UE的位置信息包括小区(Cell)标识(Identifier,ID)或者跟踪区域标识(Tracking Area Identity,TAI)或者UE位置(location),该UE location表示通过位置服务(Location Services,LCS)架构获取的UE的地理位置;
基于切片的SoR支持指示(Slice-based SoR support indication),用于指示所述终端支持选网策略信息,一种实现方式是在5G移动性管理能力(5GMM capability)信息元素中表示。
其中,第一消息可以为注册请求(registration request)消息。
步骤(2):所述第一核心网设备在接收到第一消息之后,执行第一操作,第一操作包括以下至少一项:
确认所述终端是否支持选网策略信息;
向所述第二核心网设备确认能否为所述终端请求的切片提供服务;
如果当前网络无法给终端请求的切片提供服务,则将该请求的切片放在拒绝切片信息中发送给所述终端;
如果所述终端没有携带所述请求的切片,并且所述终端的签约切片都无法在当前网络中获得服务,则所述第一核心网设备向第二核心网设备触发向所述终端提供选网策略信息;
在所述终端携带了所述目标切片,且所述请求的切片均属于拒绝切片的情况下,即在如果当前网络无法给终端请求的切片提供服务的情况下,则所述第一核心网设备触发第二核心网设备向所述终端提供所述选网策略信息;
需要说明的是,当所述终端不支持选网策略信息时,所述第一核心网设备则无需触发第二核心网设备向所述终端提供选网策略信息;当第二核心网设备确认能够为所述终端请求的切片提供服务时,所述第一核心网设备则无需触发第二核心网设备向所述终端提供选网策略信息。
其中,所述选网策略信息包含以下至少一项:
UE ID,表示该选网策略信息适用的终端的标识;
公共陆地移动网络(Public Land Mobile Network,PLMN)ID列表(list),包括一个或多个公共接入网络的标识,这里主要是其他VPLMN的信息,供终端接入时使用可用的切片;
NSSAI,表示每一个公共接入网络的标识下的可用的一个或多个切片;
网络优先级信息,表示网络下切片的优先级信息;
网络接入类型,表示接入类型(Access type);
RAT,表示随机接入技术;
选网策略信息的有效时间信息,例如有效期,表示当前选网策略信息的有效期;
步骤(3):所述第一核心网设备向所述终端发送第三消息,所述第三消息包括以下至少一项:
Rejected NSSAI,表示网络侧拒绝的切片;
Allowed NSSAI,表示网络侧接受的切片;
选网策略信息(例如,Slice-based SOR信息),一种实现方式是在SOR TRANSPORT container中携带给所述终端。
其中,第三消息可以为注册接受(registration accept)消息。
步骤(4):所述终端在接收到所述第三消息之后,若所述第三消息中指示终端需要向第一核心网设备回复确认消息,则所述终端向所述第一核心网设备发送确认消息(如注册完成(registration complete)消息),该确认消息用于向第一核心网设备确认所述终端接收到基于该选网策略信息。
步骤(5):所述终端在接收到选网策略信息之后,在下述条件下执行第二操作:
网络期望使用目标切片接入网络和/或建立会话,并且所述目标切片在当前网络属于 拒绝切片,则所述终端执行下列操作:
所述终端检查选网策略信息是否处于有效期内,如果处于有效期内,则执行后续操作,否则,所述终端执行重新选网流程;
检查选网策略信息中是否包含所述目标切片,如果包含所述目标切片,则所述终端执行后续操作,否则,所述终端执行重新选网流程;
所述终端选择所述目标切片适用的PLMN尝试发起网络接入流程。
需要说明的是,如果所述选网策略信息中包含网络优先级信息,则所述终端优先接入网络优先级较高的PLMN网络,特别的,所述终端可以按照实施例5中的PLMN先后顺序选择,即按照字节先后顺序,优先级由高到低选择PLMN网络进行接入。
在该实施例中,第一核心网设备在接收到终端的请求之后,根据网络部署,为终端提供基于切片的选网策略信息。
实施例2:
在该实施例中,由终端主动询问网络侧选网策略信息,网络侧通过非接入层(Non-Access-Stratum,NAS)传输(TRANSPORT)或注册流程将选网策略信息发送给终端。第一通信设备为第一核心网设备,第二通信设备为第二核心网设备,第一核心网设备为VPLMN AMF,第二核心网设备为HPLMN UDM或SoR-AF。如图5所示,具体流程如下:
步骤(1)-(4):所述终端与所述第一核心网设备、所述第二核心网设备执行注册操作,所述注册流程用于所述终端与网络建立服务连接。
该实施例与实施例1类似,不同之处在于步骤(5)-(9)是由所述终端主动触发,询问网络选网策略信息。
与实施例1不同的是,这一流程中,网络侧可能会下发也可能不下发所述选网策略信息,无论哪种情况,都支持由终端发起主动查询功能,主动询问网络侧选网策略信息。
步骤(5)-(6):由于业务需求或者用户主动选择,所述终端期望使用的目标切片在当前网络中暂不能使用,则所述终端向所述第一核心网设备发送第二消息,所述第二消息可以用于向网络查询与所述目标切片关联的选网策略信息。
其中,所述目标切片在当前网络中暂不能使用包括以下至少一项情况:
所述目标切片属于所述终端的拒绝切片,且关联的计时器不为0;
所述目标切片不在所述终端的配置切片中;
所述第一核心网设备在第三消息中告知所述终端当前网络不支持所述目标切片。
另外,所述第二消息包括以下至少一项:
目标切片,用于表示所述终端期望使用的切片信息;
终端的位置信息,包括Cell ID和/或TAI和/或UE location,该UE location指的是LCS架构获取的UE的地理位置;
选网策略信息(例如,Slice-based SOR信息)的查询指示,用于指示当前消息用于 查询网络侧所述目标切片关联的选网策略信息;
Requested NSSAI,用于指示所述终端请求的一个或多个切片;
Slice-based SoR support indication,用于指示所述终端支持选网策略信息,一种实现方式是在5GMM capability中表示。
需要说明的是,第二消息可以为UL NAS TRANSPORT消息或者注册请求(registration request)消息。选网策略信息的查询指示可以放在容器(container)中表征,对于拜访地网络是透传,只有主网络的网元(例如,接入管理网元(Access management Function,AMF)或者统一数据库管理网元(Unified Data Management,UDM))能够查看,所述container可以是现有的负载(payload)container,也可以是新增的container。
步骤(7):所述第一核心网设备在接收到所述终端的所述第二消息之后,向第二核心网设备查询所述目标切片关联的选网策略信息。其中,第一核心网设备可以将所述第二消息封装在容器中透传给主网络下的所述第二核心网设备。当主网络下的所述第二核心网设备回复所述选网策略信息给所述第一核心网设备时,第一核心网设备将所述选网策略信息封装在容器中透传给所述终端。
步骤(8):所述第一核心网设备向所述终端发送第三消息,所述第三消息用于携带所述选网策略信息。一种实施方式中,第三消息可以为下行(Downlink,DL)NAS TRANSPORT消息或者注册接受(registration accept)消息。其中,所述选网策略信息可以放在container中表征,对于拜访地网络是透传,只有主网络的网元(例如,AMF或者UDM)能够查看,所述container可以是现有的payload container,也可以是新增的container;
步骤(9):所述终端在接收到所述第三消息之后,所述终端执行以下操作:
如果所述第三消息成功通过完整性检查,并且所述第三消息中指示终端需要向网络侧回复确认消息,则所述终端向所述第一核心网设备发送确认消息,该确认消息用于向网络侧确认所述终端接收到选网策略信息,该确认消息可以为UL NAS传输消息或注册完成消息;
如果所述第三消息成功通过完整性检查,并且所述第三消息中携带所述选网策略信息,则所述终端保存或者更新存放在维护实体(Maintenance Entity,ME)中的选网策略信息;
如果所述第三消息没有成功通过完整性检查,则所述终端丢弃所述第三消息中的选网策略信息;
如果所述第三消息没有成功通过完整性检查,则所述终端将当前的PLMN视为低优先级的网络。
在该实施例中,终端根据业务需求,主动向第一核心网设备查询基于切片的选网策略信息。
实施例3:
在该实施例中,第一通信设备为第一核心网设备,第二通信设备为第二核心网设备,第一核心网设备为VPLMN AMF,第二核心网设备为HPLMN UDM或SoR-AF。如图6 所示,由网络侧触发选网策略信息的更新。
步骤(1):网络侧触发终端更新VPLM切片的选网策略信息。
步骤(2):第一核心网设备、第二核心网设备由于网络变化,选网策略信息发生变化,则所述第一核心网设备向所述终端发送第四消息,所述第四消息用于携带更新后的选网策略信息。一种实施方式中,该第四消息可以为配置更新命令(configuration update command)消息。
步骤(3):所述终端在接收到所述第四消息之后,向所述第一核心网设备发送第五消息,所述第五消息用于向网络侧确认所述终端接收到选网策略信息。一种实施方式中,该第五消息可以为配置更新完成(configuration update complete)消息。
步骤(4):终端使用SOR切片选择合适的VPLMN进行服务。
在该实施例中,第一核心网设备根据网络变化,为终端更新基于切片的选网策略信息。
实施例4:
在该实施例中,第一指示信息携带在5G移动性管理能力信息元素中,第一指示信息用于指示所述终端是否支持基于所述选网策略信息进行网络接入。
其中,5G移动性管理能力信息元素的格式如图7所示。其中,SBSS为新增指示(indication)。
示例地,5G移动性管理能力信息元素可以新增如下内容:
{
基于切片的SoR支持(Slice-based SoR support,SBSS)(八位字节(octet)7,比特位(bit)7)该位表示支持基于切片的SoR的能力(This bit indicates the capability to support Slice-based SoR)
Bit
0   不支持基于切片的SoR(Slice-based SoR not supported)
1   支持基于切片的SoR(Slice-based SoR supported)
}
其中,Slice-based SoR support(SBSS)为新增部分,携带第一指示信息。在第一指示信息取值为0时,指示终端不支持基于所述选网策略信息进行网络接入;在第一指示信息取值为1时,指示终端支持基于所述选网策略信息进行网络接入。
实施例5:
实施方式1:选网策略信息携带在SOR传输容器(transparent container)中。
可以对现有SOR transparent container进行增强,在现有SOR transparent container中补充选网策略信息。如图8所示,在现有SOR transparent container中增加SBS及基于切片的(Slice-based)SOR。Slice-based SOR为选网策略信息。Slice-based SOR的格式如图9所示,Slice-based SOR包括基于切片的SOR的长度(Length of Slice-based SOR)、S-NSSAI值(value)及PLMN ID and access technology list。上述S-NSSAI value包括S-NSSAI的长 度和内容。S-NSSAI值可以编码为S-NSSAI信息元素的长度和值部分,从第二个八位字节开始(S-NSSAI value is coded as the length and value part of S-NSSAI information element starting with the second octet)。PLMN标识及接入技术列表(PLMN ID and access technology list)的格式如图10所示,PLMN ID and access technology list包括PLMN标识及接入技术列表的长度(Length of PLMN ID and access technology list)、PLMN标识(PLMN ID)及接入技术标识(access technology identifier)。
另外,在所述PLMN ID and access technology list中,PLMN ID和access technology identifier的优先级是按照降序提供的,即PLMN ID 1指示最高优先级,PLMN ID n指示最低优先级。所述PLMN ID and access technology list至少携带0个,至多携带16个PLMN ID和access technology identifier组合。
实施方式2:选网策略信息携带在新增IE中,该新增IE为基于切片的SOR容器(Slice-based SOR container)。
如图11所示,在负荷容器类型值(Payload container type value)中新增消息类型Slice-based SOR container,用于网络侧指示选网策略信息已在container中携带给UE。
示例地,Payload container type value可以新增如下内容:
{
 Payload container type value(octet 1)
Bits
4 3 2 1
1 0 1 1基于切片的SOR容器(Slice-based SOR container)
}
基于切片的SOR容器信息元素(slice-based SOR container IE)为新增IE,携带UE的请求信息和/或网络的回复信息。如图12所示,slice-based SOR container IE包括基于切片的SOR容器信息元素的长度(Length of Slice-based SOR container IE)、容器头(Container header)及容器值(Container value),其中,IEI表示信息元素的标识。如图13所示,Container header包括数据类型(data type),data type为0时表示UE请求网络侧提供目标切片的选网策略信息,此时,Container value为一个或多个所述目标切片,如图14所示;data type为1时表示网络侧携带选网策略信息给终端,此时container value为图15所示的格式中的Slice-based SOR element list。
示例地,在data type为0时,UE发送的slice-based SOR container IE的格式如图14所示,UE请求网络侧提供目标切片的选网策略信息。在data type为1时,网络侧回复的slice-based SOR container IE的格式如图15所示,通过slice-based SOR container IE发送选网策略信息至终端。在data type为1时,slice-based SOR container IE包括Length of Slice-based SOR information IE、Container header及Slice-based SOR element。如图16所示,Slice-based SOR element包括Length of Slice-based SOR element、S-NSSAI及PLMN ID and  access technology list。上述S-NSSAI包括S-NSSAI的长度和内容。PLMN ID and access technology list的格式如图17所示,PLMN ID and access technology list包括Length of PLMN ID and access technology list、PLMN ID及access technology identifier。
另外,在所述PLMN ID and access technology list中,PLMN ID和access technology identifier的优先级是按照降序提供的,即PLMN ID 1指示最高优先级,PLMN ID n指示最低优先级。所述PLMN ID and access technology list至少携带0个,至多携带16个PLMN ID和access technology identifier组合。
本申请实施例提供的网络接入方法,执行主体可以为网络接入装置。本申请实施例中以网络接入装置执行网络接入方法为例,说明本申请实施例提供的网络接入的装置。
请参见图18,图18是本申请实施例提供的一种网络接入装置的结构图,终端包括所述网络接入装置,如图18所示,网络接入装置300包括:
第一接收模块301,用于接收选网策略信息,所述选网策略信息指示用于提供目标切片服务的至少一个网络,所述目标切片为所述终端期望查询和/或使用的切片;
接入模块302,用于基于所述选网策略信息进行网络接入。
可选地,所述装置还包括:
第一发送模块,用于向第一通信设备发送第一消息,所述第一消息包括如下至少一项:
所述终端的位置信息;
第一指示信息,所述第一指示信息用于指示所述终端是否支持基于所述选网策略信息进行网络接入。
可选地,所述选网策略信息包括如下至少一项:
终端标识;
用于提供所述目标切片服务的公共陆地移动网络PLMN的标识;
所述目标切片的切片信息;
网络优先级信息;
网络接入类型;
无线接入技术RAT;
选网策略信息的有效时间信息。
可选地,所述第一指示信息携带在5G移动性管理能力信息元素和/或目标信息元素中。
可选地,所述接入模块具体用于:
在所述终端期望使用所述目标切片接入网络和/或建立会话,且所述目标切片属于所述终端对应的拒绝切片的情况下,执行如下操作:
在所述终端检测到所述选网策略信息中包括所述目标切片的切片信息的情况下,所述终端选择所述选网策略信息中与所述目标切片对应的PLMN进行网络接入。
可选地,所述装置还包括:
检测模块,用于在所述终端检测到所述选网策略信息满足所述选网策略信息对应的有 效时间信息的情况下,检测所述选网策略信息中是否包括所述目标切片的切片信息。
可选地,所述终端选择所述选网策略信息中与所述目标切片对应的PLMN进行网络接入,包括:
在所述选网策略信息中包括网络优先级信息的情况下,所述终端基于所述网络优先级信息选择PLMN进行网络接入。
可选地,所述网络优先级信息包括PLMN标识优先级及接入技术标识优先级。
可选地,所述装置还包括:
第二发送模块,用于向第一通信设备发送第二消息,所述第二消息用于查询所述选网策略信息。
可选地,所述第二发送模块具体用于:
在满足第一条件的情况下,所述终端向第一通信设备发送第二消息;
其中,所述第一条件包括如下至少一项:
所述目标切片属于所述终端对应的拒绝切片;
所述目标切片不属于所述终端的配置切片;
所述第一通信设备向所述终端指示不支持所述目标切片;
所述终端期望使用所述目标切片。
可选地,所述第二消息包括如下至少一项:
所述目标切片的切片信息;
所述终端的位置信息;
第一消息标识,所述第一消息标识用于标识所述第二消息用于查询所述选网策略信息;
第一指示信息,所述第一指示信息用于指示所述终端是否支持基于所述选网策略信息进行网络接入。
可选地,所述第一消息标识携带在基于切片的第一漫游引导SOR容器信息元素中。
可选地,所述第一SOR容器信息元素包括如下至少一项:
第一SOR容器信息元素的标识;
第一SOR容器信息元素的长度;
第一容器头;
第一容器值;
其中,所述第一容器头中包括所述第一消息标识,所述第一消息标识用于表征请求所述第一通信设备提供所述选网策略信息;所述第一容器值包括至少一个所述目标切片的切片信息,所述切片信息包括切片长度和切片内容。
可选地,所述第一接收模块具体用于:
通过第三消息接收第一通信设备发送的选网策略信息;
所述装置还包括:
检查模块,用于对所述第三消息进行完整性检查,基于完整性检查结果执行目标操作。
可选地,所述检查模块具体用于如下至少一项:
在所述完整性检查结果指示所述第三消息完整的情况下,向所述第一通信设备发送确认消息,所述确认消息用于指示确认接收到所述选网策略信息;
在所述完整性检查结果指示所述第三消息完整的情况下,存储所述第三消息中的选网策略信息;或者,在所述完整性检查结果指示所述第三消息完整的情况下,基于所述第三消息中的选网策略信息更新已存储的选网策略信息;
在所述完整性检查结果指示所述第三消息不完整的情况下,丢弃所述第三消息中的选网策略信息。
可选地,所述装置还包括:
第二接收模块,用于在所述选网策略信息发生更新的情况下,接收第一通信设备发送的第四消息,所述第四消息中携带更新后的选网策略信息。
可选地,所述装置还包括:
第三发送模块,用于向所述第一通信设备发送第五消息,所述第五消息用于指示确认接收到所述更新后的选网策略信息。
可选地,所述选网策略信息通过基于切片的第二SOR容器信息元素表征,所述第二SOR容器信息元素包括如下至少一项:
第二SOR容器信息元素的标识;
第二SOR容器信息元素的长度;
第二容器头;
第二容器值;
其中,所述第二容器头中包括第二消息标识,所述第二消息标识用于表征所述第一通信设备向所述终端提供所述选网策略信息;所述第二容器值包括至少一个基于切片的SOR元素域,所述SOR元素域包括所述SOR元素域的长度、PLMN标识及接入技术列表及至少一个所述目标切片的切片信息。
可选地,所述选网策略信息携带在SOR传输容器信息元素中,所述SOR传输容器信息元素包括第二指示信息,所述第二指示信息用于指示所述SOR传输容器信息元素中是否携带所述选网策略信息。
本申请实施例中的网络接入装置,第一接收模块接收选网策略信息,所述选网策略信息指示用于提供目标切片服务的至少一个网络,所述目标切片为所述终端期望查询和/或使用的切片;接入模块基于所述选网策略信息进行网络接入。这样,终端能够通过接收到的选网策略信息接入用于提供目标切片服务的网络,从而能够使用该目标切片相应的服务。
本申请实施例中的网络接入装置可以是电子设备,例如具有操作系统的电子设备,也可以是电子设备中的部件,例如集成电路或芯片。该电子设备可以是终端,也可以为除终端之外的其他设备。示例性的,终端可以包括但不限于上述所列举的终端11的类型,其他设备可以为服务器、网络附属存储器(Network Attached Storage,NAS)等,本申请实 施例不作具体限定。
本申请实施例提供的网络接入装置能够实现图2的方法实施例实现的各个过程,并达到相同的技术效果,为避免重复,这里不再赘述。
本申请实施例提供的网络接入方法,执行主体可以为网络接入装置。本申请实施例中以网络接入装置执行网络接入方法为例,说明本申请实施例提供的网络接入的装置。
请参见图19,图19是本申请实施例提供的一种网络接入装置的结构图,第一通信设备包括所述网络接入装置,如图19所示,网络接入装置400包括:
第一发送模块401,用于向终端发送选网策略信息,所述选网策略信息指示用于提供目标切片服务的至少一个网络,所述目标切片为所述终端期望查询和/或使用的切片;
其中,所述选网策略信息用于所述终端进行网络接入。
可选地,所述装置还包括:
第一接收模块,用于接收所述终端发送的第一消息,所述第一消息包括如下至少一项:
所述终端的位置信息;
第一指示信息,所述第一指示信息用于指示所述终端是否支持基于所述选网策略信息进行网络接入。
可选地,所述装置还包括:
执行模块,用于执行第一操作,所述第一操作包括如下至少一项:
确定所述终端是否支持基于所述选网策略信息进行网络接入;
在所述第一消息未携带所述目标切片,且所述终端的签约切片均不能提供服务的情况下,触发第二通信设备向所述终端提供所述选网策略信息;
在所述第一消息携带所述目标切片,且所述目标切片属于所述终端对应的拒绝切片的情况下,触发第二通信设备向所述终端提供所述选网策略信息。
可选地,所述选网策略信息包括如下至少一项:
终端标识;
用于提供所述目标切片服务的公共陆地移动网络PLMN的标识;
所述目标切片的切片信息;
网络优先级信息;
网络接入类型;
无线接入技术RAT;
选网策略信息的有效时间信息。
可选地,所述装置还包括:
第二接收模块,用于接收所述终端发送的第二消息,所述第二消息用于查询所述选网策略信息。
可选地,所述第二消息包括如下至少一项:
所述目标切片的切片信息;
所述终端的位置信息;
第一消息标识,所述第一消息标识用于标识所述第二消息用于查询所述选网策略信息;
第一指示信息,所述第一指示信息用于指示所述终端是否支持基于所述选网策略信息进行网络接入。
可选地,所述第一消息标识携带在基于切片的第一漫游引导SOR容器信息元素中。
可选地,所述第一SOR容器信息元素包括如下至少一项:
第一SOR容器信息元素的标识;
第一SOR容器信息元素的长度;
第一容器头;
第一容器值;
其中,所述第一容器头中包括所述第一消息标识,所述第一消息标识用于表征请求所述第一通信设备提供所述选网策略信息;所述第一容器值包括至少一个所述目标切片的切片信息,所述切片信息包括切片长度和切片内容。
可选地,所述装置还包括:
第二发送模块,用于基于所述第二消息向第二通信设备发送查询消息,所述查询消息用于查询所述选网策略信息。
可选地,所述装置还包括:
第三发送模块,用于在所述选网策略信息发生更新的情况下,向所述终端发送第四消息,所述第四消息中携带更新后的选网策略信息。
可选地,所述装置还包括:
第三接收模块,用于接收所述终端发送的第五消息,所述第五消息用于指示确认接收到所述更新后的选网策略信息。
可选地,所述选网策略信息通过基于切片的第二SOR容器信息元素表征,所述第二SOR容器信息元素包括如下至少一项:
第二SOR容器信息元素的标识;
第二SOR容器信息元素的长度;
第二容器头;
第二容器值;
其中,所述第二容器头中包括第二消息标识,所述第二消息标识用于表征所述第一通信设备向所述终端提供所述选网策略信息;所述第二容器值包括至少一个基于切片的SOR元素域,所述SOR元素域包括所述SOR元素域的长度、PLMN标识及接入技术列表及至少一个所述目标切片的切片信息。
可选地,所述选网策略信息携带在SOR传输容器信息元素中,所述SOR传输容器信息元素包括第二指示信息,所述第二指示信息用于指示所述SOR传输容器信息元素中是否携带所述选网策略信息。
本申请实施例中的网络接入装置,第一发送模块向终端发送选网策略信息,所述选网策略信息指示用于提供目标切片服务的至少一个网络,所述目标切片为所述终端期望查询和/或使用的切片;其中,所述选网策略信息用于所述终端进行网络接入。这样,终端能够通过接收到的选网策略信息接入用于提供目标切片服务的网络,从而能够使用该目标切片相应的服务。
本申请实施例中的网络接入装置可以是电子设备,例如具有操作系统的电子设备,也可以是电子设备中的部件,例如集成电路或芯片。该电子设备可以是终端,也可以为除终端之外的其他设备。示例性的,终端可以包括但不限于上述所列举的终端11的类型,其他设备可以为服务器、网络附属存储器(Network Attached Storage,NAS)等,本申请实施例不作具体限定。
本申请实施例提供的网络接入装置能够实现图3的方法实施例实现的各个过程,并达到相同的技术效果,为避免重复,这里不再赘述。
可选地,如图20所示,本申请实施例还提供一种通信设备500,包括处理器501和存储器502,存储器502上存储有可在所述处理器501上运行的程序或指令,例如,该通信设备500为终端时,该程序或指令被处理器501执行时实现上述应用于终端的网络接入方法实施例的各个步骤,且能达到相同的技术效果。该通信设备500为第一通信设备时,该程序或指令被处理器501执行时实现上述应用于第一通信设备的网络接入方法实施例的各个步骤,且能达到相同的技术效果,为避免重复,这里不再赘述。
本申请实施例还提供一种终端,包括处理器及通信接口,其中,所述通信接口用于接收选网策略信息,所述选网策略信息指示用于提供目标切片服务的至少一个网络,所述目标切片为所述终端期望查询和/或使用的切片;所述处理器用于基于所述选网策略信息进行网络接入。该终端实施例与上述网络接入方法实施例对应,上述网络接入方法实施例的各个实施过程和实现方式均可适用于该终端实施例中,且能达到相同的技术效果。具体地,图21为实现本申请实施例的一种终端的硬件结构示意图。
该终端600包括但不限于:射频单元601、网络模块602、音频输出单元603、输入单元604、传感器605、显示单元606、用户输入单元607、接口单元608、存储器609以及处理器610等中的至少部分部件。
本领域技术人员可以理解,终端600还可以包括给各个部件供电的电源(比如电池),电源可以通过电源管理系统与处理器610逻辑相连,从而通过电源管理系统实现管理充电、放电、以及功耗管理等功能。图21中示出的终端结构并不构成对终端的限定,终端可以包括比图示更多或更少的部件,或者组合某些部件,或者不同的部件布置,在此不再赘述。
应理解的是,本申请实施例中,输入单元604可以包括图形处理单元(Graphics Processing Unit,GPU)6041和麦克风6042,图形处理器6041对在视频捕获模式或图像捕获模式中由图像捕获装置(如摄像头)获得的静态图片或视频的图像数据进行处理。显示单元606可包括显示面板6061,可以采用液晶显示器、有机发光二极管等形式来配置 显示面板6061。用户输入单元607包括触控面板6071以及其他输入设备6072中的至少一种。触控面板6071,也称为触摸屏。触控面板6071可包括触摸检测装置和触摸控制器两个部分。其他输入设备6072可以包括但不限于物理键盘、功能键(比如音量控制按键、开关按键等)、轨迹球、鼠标、操作杆,在此不再赘述。
本申请实施例中,射频单元601接收来自网络侧设备的下行数据后,可以传输给处理器610进行处理;另外,射频单元601可以向网络侧设备发送上行数据。通常,射频单元601包括但不限于天线、放大器、收发信机、耦合器、低噪声放大器、双工器等。
存储器609可用于存储软件程序或指令以及各种数据。存储器609可主要包括存储程序或指令的第一存储区和存储数据的第二存储区,其中,第一存储区可存储操作系统、至少一个功能所需的应用程序或指令(比如声音播放功能、图像播放功能等)等。此外,存储器609可以包括易失性存储器或非易失性存储器,或者,存储器609可以包括易失性和非易失性存储器两者。其中,非易失性存储器可以是只读存储器(Read-Only Memory,ROM)、可编程只读存储器(Programmable ROM,PROM)、可擦除可编程只读存储器(Erasable PROM,EPROM)、电可擦除可编程只读存储器(Electrically EPROM,EEPROM)或闪存。易失性存储器可以是随机存取存储器(Random Access Memory,RAM),静态随机存取存储器(Static RAM,SRAM)、动态随机存取存储器(Dynamic RAM,DRAM)、同步动态随机存取存储器(Synchronous DRAM,SDRAM)、双倍数据速率同步动态随机存取存储器(Double Data Rate SDRAM,DDRSDRAM)、增强型同步动态随机存取存储器(Enhanced SDRAM,ESDRAM)、同步连接动态随机存取存储器(Synch link DRAM,SLDRAM)和直接内存总线随机存取存储器(Direct Rambus RAM,DRRAM)。本申请实施例中的存储器609包括但不限于这些和任意其它适合类型的存储器。
处理器610可包括一个或多个处理单元;可选的,处理器610集成应用处理器和调制解调处理器,其中,应用处理器主要处理涉及操作系统、用户界面和应用程序等的操作,调制解调处理器主要处理无线通信信号,如基带处理器。可以理解的是,上述调制解调处理器也可以不集成到处理器610中。
其中,射频单元601,用于接收选网策略信息,所述选网策略信息指示用于提供目标切片服务的至少一个网络,所述目标切片为所述终端期望查询和/或使用的切片;
处理器610用于:基于所述选网策略信息进行网络接入。
可选地,射频单元601还用于:
向第一通信设备发送第一消息,所述第一消息包括如下至少一项:
所述终端的位置信息;
第一指示信息,所述第一指示信息用于指示所述终端是否支持基于所述选网策略信息进行网络接入。
可选地,所述选网策略信息包括如下至少一项:
终端标识;
用于提供所述目标切片服务的公共陆地移动网络PLMN的标识;
所述目标切片的切片信息;
网络优先级信息;
网络接入类型;
无线接入技术RAT;
选网策略信息的有效时间信息。
可选地,所述第一指示信息携带在5G移动性管理能力信息元素和/或目标信息元素中。
可选地,处理器610还用于:
在所述终端期望使用所述目标切片接入网络和/或建立会话,且所述目标切片属于所述终端对应的拒绝切片的情况下,执行如下操作:
在所述终端检测到所述选网策略信息中包括所述目标切片的切片信息的情况下,选择所述选网策略信息中与所述目标切片对应的PLMN进行网络接入。
可选地,处理器610还用于:
在所述终端检测到所述选网策略信息满足所述选网策略信息对应的有效时间信息的情况下,检测所述选网策略信息中是否包括所述目标切片的切片信息。
可选地,处理器610还用于:
在所述选网策略信息中包括网络优先级信息的情况下,基于所述网络优先级信息选择PLMN进行网络接入。
可选地,所述网络优先级信息包括PLMN标识优先级及接入技术标识优先级。
可选地,射频单元601还用于:
向第一通信设备发送第二消息,所述第二消息用于查询所述选网策略信息。
可选地,射频单元601还用于:
在满足第一条件的情况下,向第一通信设备发送第二消息;
其中,所述第一条件包括如下至少一项:
所述目标切片属于所述终端对应的拒绝切片;
所述目标切片不属于所述终端的配置切片;
所述第一通信设备向所述终端指示不支持所述目标切片;
所述终端期望使用所述目标切片。
可选地,所述第二消息包括如下至少一项:
所述目标切片的切片信息;
所述终端的位置信息;
第一消息标识,所述第一消息标识用于标识所述第二消息用于查询所述选网策略信息;
第一指示信息,所述第一指示信息用于指示所述终端是否支持基于所述选网策略信息进行网络接入。
可选地,所述第一消息标识携带在基于切片的第一漫游引导SOR容器信息元素中。
可选地,所述第一SOR容器信息元素包括如下至少一项:
第一SOR容器信息元素的标识;
第一SOR容器信息元素的长度;
第一容器头;
第一容器值;
其中,所述第一容器头中包括所述第一消息标识,所述第一消息标识用于表征请求所述第一通信设备提供所述选网策略信息;所述第一容器值包括至少一个所述目标切片的切片信息,所述切片信息包括切片长度和切片内容。
可选地,射频单元601还用于:
通过第三消息接收第一通信设备发送的选网策略信息;
处理器610还用于:
对所述第三消息进行完整性检查,基于完整性检查结果执行目标操作。
可选地,处理器610还用于如下至少一项:
在所述完整性检查结果指示所述第三消息完整的情况下,向所述第一通信设备发送确认消息,所述确认消息用于指示确认接收到所述选网策略信息;
在所述完整性检查结果指示所述第三消息完整的情况下,存储所述第三消息中的选网策略信息;或者,在所述完整性检查结果指示所述第三消息完整的情况下,基于所述第三消息中的选网策略信息更新已存储的选网策略信息;
在所述完整性检查结果指示所述第三消息不完整的情况下,丢弃所述第三消息中的选网策略信息。
可选地,射频单元601还用于:
在所述选网策略信息发生更新的情况下,接收第一通信设备发送的第四消息,所述第四消息中携带更新后的选网策略信息。
可选地,射频单元601还用于:
向所述第一通信设备发送第五消息,所述第五消息用于指示确认接收到所述更新后的选网策略信息。
可选地,所述选网策略信息通过基于切片的第二SOR容器信息元素表征,所述第二SOR容器信息元素包括如下至少一项:
第二SOR容器信息元素的标识;
第二SOR容器信息元素的长度;
第二容器头;
第二容器值;
其中,所述第二容器头中包括第二消息标识,所述第二消息标识用于表征所述第一通信设备向所述终端提供所述选网策略信息;所述第二容器值包括至少一个基于切片的SOR元素域,所述SOR元素域包括所述SOR元素域的长度、PLMN标识及接入技术列表及至 少一个所述目标切片的切片信息。
可选地,所述选网策略信息携带在SOR传输容器信息元素中,所述SOR传输容器信息元素包括第二指示信息,所述第二指示信息用于指示所述SOR传输容器信息元素中是否携带所述选网策略信息。
本申请实施例还提供一种通信设备,该通信设备为第一通信设备,该第一通信设备可以为核心网设备,包括处理器和通信接口,所述通信接口用于向终端发送选网策略信息,所述选网策略信息指示用于提供目标切片服务的至少一个网络,所述目标切片为所述终端期望查询和/或使用的切片;其中,所述选网策略信息用于所述终端进行网络接入。该通信设备实施例与上述网络接入方法实施例对应,上述网络接入方法实施例的各个实施过程和实现方式均可适用于该通信设备实施例中,且能达到相同的技术效果。
具体地,本申请实施例还提供一种通信设备,该通信设备为第一通信设备,该第一通信设备可以为核心网设备。如图22所示,该通信设备700包括:天线701、射频装置702、基带装置703、处理器704和存储器705。天线701与射频装置702连接。在上行方向上,射频装置702通过天线701接收信息,将接收的信息发送给基带装置703进行处理。在下行方向上,基带装置703对要发送的信息进行处理,并发送给射频装置702,射频装置702对收到的信息进行处理后经过天线701发送出去。
以上实施例中通信设备执行的方法可以在基带装置703中实现,该基带装置703包括基带处理器。
基带装置703例如可以包括至少一个基带板,该基带板上设置有多个芯片,如图22所示,其中一个芯片例如为基带处理器,通过总线接口与存储器705连接,以调用存储器705中的程序,执行以上方法实施例中所示的网络设备操作。
该通信设备还可以包括网络接口706,该接口例如为通用公共无线接口(common public radio interface,CPRI)。
具体地,本申请实施例的通信设备700还包括:存储在存储器705上并可在处理器704上运行的指令或程序,处理器704调用存储器705中的指令或程序执行图19所示各模块执行的方法,并达到相同的技术效果,为避免重复,故不在此赘述。
本申请实施例还提供一种可读存储介质,所述可读存储介质上存储有程序或指令,该程序或指令被处理器执行时实现上述的网络接入方法实施例的各个过程,且能达到相同的技术效果,为避免重复,这里不再赘述。
其中,所述处理器为上述实施例中所述的终端中的处理器。所述可读存储介质,可以是非易失性的,也可以是非瞬态的。可读存储介质可以包括计算机可读存储介质,如计算机只读存储器ROM、随机存取存储器RAM、磁碟或者光盘等。
本申请实施例另提供了一种芯片,所述芯片包括处理器和通信接口,所述通信接口和所述处理器耦合,所述处理器用于运行程序或指令,实现上述网络接入方法实施例的各个过程,且能达到相同的技术效果,为避免重复,这里不再赘述。
应理解,本申请实施例提到的芯片还可以称为系统级芯片,系统芯片,芯片系统或片上系统芯片等。
本申请实施例另提供了一种计算机程序/程序产品,所述计算机程序/程序产品被存储在存储介质中,所述计算机程序/程序产品被至少一个处理器执行以实现上述网络接入方法实施例的各个过程,且能达到相同的技术效果,为避免重复,这里不再赘述。
本申请实施例还提供了一种网络接入系统,包括:终端及第一通信设备,所述终端可用于执行如上所述应用于终端的网络接入方法的步骤,所述网络侧设备可用于执行如上所述的应用于第一通信设备的网络接入方法的步骤。
需要说明的是,在本文中,术语“包括”、“包含”或者其任何其他变体意在涵盖非排他性的包含,从而使得包括一系列要素的过程、方法、物品或者装置不仅包括那些要素,而且还包括没有明确列出的其他要素,或者是还包括为这种过程、方法、物品或者装置所固有的要素。在没有更多限制的情况下,由语句“包括一个……”限定的要素,并不排除在包括该要素的过程、方法、物品或者装置中还存在另外的相同要素。此外,需要指出的是,本申请实施方式中的方法和装置的范围不限按示出或讨论的顺序来执行功能,还可包括根据所涉及的功能按基本同时的方式或按相反的顺序来执行功能,例如,可以按不同于所描述的次序来执行所描述的方法,并且还可以添加、省去、或组合各种步骤。另外,参照某些示例所描述的特征可在其他示例中被组合。
通过以上的实施方式的描述,本领域的技术人员可以清楚地了解到上述实施例方法可借助软件加必需的通用硬件平台的方式来实现,当然也可以通过硬件,但很多情况下前者是更佳的实施方式。基于这样的理解,本申请的技术方案本质上或者说对相关技术做出贡献的部分可以以计算机软件产品的形式体现出来,该计算机软件产品存储在一个存储介质(如ROM/RAM、磁碟、光盘)中,包括若干指令用以使得一台终端(可以是手机,计算机,服务器,空调器,或者网络设备等)执行本申请各个实施例所述的方法。
上面结合附图对本申请的实施例进行了描述,但是本申请并不局限于上述的具体实施方式,上述的具体实施方式仅仅是示意性的,而不是限制性的,本领域的普通技术人员在本申请的启示下,在不脱离本申请宗旨和权利要求所保护的范围情况下,还可做出很多形式,均属于本申请的保护之内。

Claims (37)

  1. 一种网络接入方法,包括:
    终端接收选网策略信息,所述选网策略信息指示用于提供目标切片服务的至少一个网络,所述目标切片为所述终端期望查询和/或使用的切片;
    所述终端基于所述选网策略信息进行网络接入。
  2. 根据权利要求1所述的方法,其中,所述终端接收选网策略信息之前,所述方法还包括:
    所述终端向第一通信设备发送第一消息,所述第一消息包括如下至少一项:
    所述终端的位置信息;
    第一指示信息,所述第一指示信息用于指示所述终端是否支持基于所述选网策略信息进行网络接入。
  3. 根据权利要求1所述的方法,其中,所述选网策略信息包括如下至少一项:
    终端标识;
    用于提供所述目标切片服务的公共陆地移动网络PLMN的标识;
    所述目标切片的切片信息;
    网络优先级信息;
    网络接入类型;
    无线接入技术RAT;
    选网策略信息的有效时间信息。
  4. 根据权利要求2所述的方法,其中,所述第一指示信息携带在5G移动性管理能力信息元素和/或目标信息元素中。
  5. 根据权利要求3所述的方法,其中,所述终端基于所述选网策略信息进行网络接入,包括:
    在所述终端期望使用所述目标切片接入网络和/或建立会话,且所述目标切片属于所述终端对应的拒绝切片的情况下,所述终端执行如下操作:
    在所述终端检测到所述选网策略信息中包括所述目标切片的切片信息的情况下,所述终端选择所述选网策略信息中与所述目标切片对应的PLMN进行网络接入。
  6. 根据权利要求5所述的方法,其中,所述在所述终端检测到所述选网策略信息中包括所述目标切片的切片信息的情况下,所述终端选择所述选网策略信息中与所述目标切片对应的PLMN进行网络接入之前,所述方法还包括:
    在所述终端检测到所述选网策略信息满足所述选网策略信息对应的有效时间信息的情况下,所述终端检测所述选网策略信息中是否包括所述目标切片的切片信息。
  7. 根据权利要求5所述的方法,其中,所述终端选择所述选网策略信息中与所述目标切片对应的PLMN进行网络接入,包括:
    在所述选网策略信息中包括网络优先级信息的情况下,所述终端基于所述网络优先级信息选择PLMN进行网络接入。
  8. 根据权利要求3所述的方法,其中,所述网络优先级信息包括PLMN标识优先级及接入技术标识优先级。
  9. 根据权利要求1所述的方法,其中,所述终端接收选网策略信息之前,所述方法还包括:
    所述终端向第一通信设备发送第二消息,所述第二消息用于查询所述选网策略信息。
  10. 根据权利要求9所述的方法,其中,所述终端向第一通信设备发送第二消息,包括:
    在满足第一条件的情况下,所述终端向第一通信设备发送第二消息;
    其中,所述第一条件包括如下至少一项:
    所述目标切片属于所述终端对应的拒绝切片;
    所述目标切片不属于所述终端的配置切片;
    所述第一通信设备向所述终端指示不支持所述目标切片;
    所述终端期望使用所述目标切片。
  11. 根据权利要求9所述的方法,其中,所述第二消息包括如下至少一项:
    所述目标切片的切片信息;
    所述终端的位置信息;
    第一消息标识,所述第一消息标识用于标识所述第二消息用于查询所述选网策略信息;
    第一指示信息,所述第一指示信息用于指示所述终端是否支持基于所述选网策略信息进行网络接入。
  12. 根据权利要求11所述的方法,其中,所述第一消息标识携带在基于切片的第一漫游引导SOR容器信息元素中。
  13. 根据权利要求12所述的方法,其中,所述第一SOR容器信息元素包括如下至少一项:
    第一SOR容器信息元素的标识;
    第一SOR容器信息元素的长度;
    第一容器头;
    第一容器值;
    其中,所述第一容器头中包括所述第一消息标识,所述第一消息标识用于表征请求所述第一通信设备提供所述选网策略信息;所述第一容器值包括至少一个所述目标切片的切片信息,所述切片信息包括切片长度和切片内容。
  14. 根据权利要求1所述的方法,其中,所述终端接收选网策略信息,包括:
    终端通过第三消息接收第一通信设备发送的选网策略信息;
    所述方法还包括:
    所述终端对所述第三消息进行完整性检查,基于完整性检查结果执行目标操作。
  15. 根据权利要求14所述的方法,其中,所述基于完整性检查结果执行目标操作,包括如下至少一项:
    在所述完整性检查结果指示所述第三消息完整的情况下,所述终端向所述第一通信设备发送确认消息,所述确认消息用于指示确认接收到所述选网策略信息;
    在所述完整性检查结果指示所述第三消息完整的情况下,所述终端存储所述第三消息中的选网策略信息;或者,在所述完整性检查结果指示所述第三消息完整的情况下,所述终端基于所述第三消息中的选网策略信息更新已存储的选网策略信息;
    在所述完整性检查结果指示所述第三消息不完整的情况下,所述终端丢弃所述第三消息中的选网策略信息。
  16. 根据权利要求1所述的方法,其中,所述方法还包括:
    在所述选网策略信息发生更新的情况下,所述终端接收第一通信设备发送的第四消息,所述第四消息中携带更新后的选网策略信息。
  17. 根据权利要求16所述的方法,其中,所述终端接收第一通信设备发送的第四消息之后,所述方法还包括:
    所述终端向所述第一通信设备发送第五消息,所述第五消息用于指示确认接收到所述更新后的选网策略信息。
  18. 根据权利要求1所述的方法,其中,所述选网策略信息通过基于切片的第二SOR容器信息元素表征,所述第二SOR容器信息元素包括如下至少一项:
    第二SOR容器信息元素的标识;
    第二SOR容器信息元素的长度;
    第二容器头;
    第二容器值;
    其中,所述第二容器头中包括第二消息标识,所述第二消息标识用于表征第一通信设备向所述终端提供所述选网策略信息;所述第二容器值包括至少一个基于切片的SOR元素域,所述SOR元素域包括所述SOR元素域的长度、PLMN标识及接入技术列表及至少一个所述目标切片的切片信息。
  19. 根据权利要求1所述的方法,其中,所述选网策略信息携带在SOR传输容器信息元素中,所述SOR传输容器信息元素包括第二指示信息,所述第二指示信息用于指示所述SOR传输容器信息元素中是否携带所述选网策略信息。
  20. 一种网络接入方法,包括:
    第一通信设备向终端发送选网策略信息,所述选网策略信息指示用于提供目标切片服务的至少一个网络,所述目标切片为所述终端期望查询和/或使用的切片;
    其中,所述选网策略信息用于所述终端进行网络接入。
  21. 根据权利要求20所述的方法,其中,所述第一通信设备向终端发送选网策略信 息之前,所述方法还包括:
    所述第一通信设备接收所述终端发送的第一消息,所述第一消息包括如下至少一项:
    所述终端的位置信息;
    第一指示信息,所述第一指示信息用于指示所述终端是否支持基于所述选网策略信息进行网络接入。
  22. 根据权利要求21所述的方法,其中,所述第一通信设备接收所述终端发送的第一消息之后,所述方法还包括:
    所述第一通信设备执行第一操作,所述第一操作包括如下至少一项:
    确定所述终端是否支持基于所述选网策略信息进行网络接入;
    在所述第一消息未携带所述目标切片,且所述终端的签约切片均不能提供服务的情况下,触发第二通信设备向所述终端提供所述选网策略信息;
    在所述第一消息携带所述目标切片,且所述目标切片属于所述终端对应的拒绝切片的情况下,触发第二通信设备向所述终端提供所述选网策略信息。
  23. 根据权利要求20所述的方法,其中,所述选网策略信息包括如下至少一项:
    终端标识;
    用于提供所述目标切片服务的公共陆地移动网络PLMN的标识;
    所述目标切片的切片信息;
    网络优先级信息;
    网络接入类型;
    无线接入技术RAT;
    选网策略信息的有效时间信息。
  24. 根据权利要求20所述的方法,其中,所述第一通信设备向终端发送选网策略信息之前,所述方法还包括:
    所述第一通信设备接收所述终端发送的第二消息,所述第二消息用于查询所述选网策略信息。
  25. 根据权利要求24所述的方法,其中,所述第二消息包括如下至少一项:
    所述目标切片的切片信息;
    所述终端的位置信息;
    第一消息标识,所述第一消息标识用于标识所述第二消息用于查询所述选网策略信息;
    第一指示信息,所述第一指示信息用于指示所述终端是否支持基于所述选网策略信息进行网络接入。
  26. 根据权利要求25所述的方法,其中,所述第一消息标识携带在基于切片的第一漫游引导SOR容器信息元素中。
  27. 根据权利要求26所述的方法,其中,所述第一SOR容器信息元素包括如下至少一项:
    第一SOR容器信息元素的标识;
    第一SOR容器信息元素的长度;
    第一容器头;
    第一容器值;
    其中,所述第一容器头中包括所述第一消息标识,所述第一消息标识用于表征请求所述第一通信设备提供所述选网策略信息;所述第一容器值包括至少一个所述目标切片的切片信息,所述切片信息包括切片长度和切片内容。
  28. 根据权利要求24所述的方法,其中,所述第一通信设备接收所述终端发送的第二消息之后,所述方法还包括:
    所述第一通信设备基于所述第二消息向第二通信设备发送查询消息,所述查询消息用于查询所述选网策略信息。
  29. 根据权利要求20所述的方法,其中,所述方法还包括:
    在所述选网策略信息发生更新的情况下,所述第一通信设备向所述终端发送第四消息,所述第四消息中携带更新后的选网策略信息。
  30. 根据权利要求29所述的方法,其中,所述第一通信设备向所述终端发送第四消息之后,所述方法还包括:
    所述第一通信设备接收所述终端发送的第五消息,所述第五消息用于指示确认接收到所述更新后的选网策略信息。
  31. 根据权利要求20所述的方法,其中,所述选网策略信息通过基于切片的第二SOR容器信息元素表征,所述第二SOR容器信息元素包括如下至少一项:
    第二SOR容器信息元素的标识;
    第二SOR容器信息元素的长度;
    第二容器头;
    第二容器值;
    其中,所述第二容器头中包括第二消息标识,所述第二消息标识用于表征所述第一通信设备向所述终端提供所述选网策略信息;所述第二容器值包括至少一个基于切片的SOR元素域,所述SOR元素域包括所述SOR元素域的长度、PLMN标识及接入技术列表及至少一个所述目标切片的切片信息。
  32. 根据权利要求20所述的方法,其中,所述选网策略信息携带在SOR传输容器信息元素中,所述SOR传输容器信息元素包括第二指示信息,所述第二指示信息用于指示所述SOR传输容器信息元素中是否携带所述选网策略信息。
  33. 一种网络接入装置,终端包括所述网络接入装置,所述装置包括:
    第一接收模块,用于接收选网策略信息,所述选网策略信息指示用于提供目标切片服务的至少一个网络,所述目标切片为所述终端期望查询和/或使用的切片;
    接入模块,用于基于所述选网策略信息进行网络接入。
  34. 一种网络接入装置,第一通信设备包括所述网络接入装置,所述装置包括:
    第一发送模块,用于向终端发送选网策略信息,所述选网策略信息指示用于提供目标切片服务的至少一个网络,所述目标切片为所述终端期望查询和/或使用的切片;
    其中,所述选网策略信息用于所述终端进行网络接入。
  35. 一种终端,包括处理器和存储器,所述存储器存储可在所述处理器上运行的程序或指令,其中,所述程序或指令被所述处理器执行时实现如权利要求1至19任一项所述的网络接入方法的步骤。
  36. 一种通信设备,包括处理器和存储器,所述存储器存储可在所述处理器上运行的程序或指令,其中,所述程序或指令被所述处理器执行时实现如权利要求20至32任一项所述的网络接入方法的步骤。
  37. 一种可读存储介质,所述可读存储介质上存储程序或指令,其中,所述程序或指令被处理器执行时实现如权利要求1至19任一项所述的网络接入方法的步骤,或者实现如权利要求20至32任一项所述的网络接入方法的步骤。
PCT/CN2023/113010 2022-08-18 2023-08-15 网络接入方法、装置、终端及通信设备 WO2024037512A1 (zh)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN202210996011.4 2022-08-18
CN202210996011.4A CN117641514A (zh) 2022-08-18 2022-08-18 网络接入方法、装置、终端及通信设备

Publications (1)

Publication Number Publication Date
WO2024037512A1 true WO2024037512A1 (zh) 2024-02-22

Family

ID=89940692

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2023/113010 WO2024037512A1 (zh) 2022-08-18 2023-08-15 网络接入方法、装置、终端及通信设备

Country Status (2)

Country Link
CN (1) CN117641514A (zh)
WO (1) WO2024037512A1 (zh)

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20210282084A1 (en) * 2020-03-09 2021-09-09 Qualcomm Incorporated Slice-aware plmn selection
CN113411781A (zh) * 2021-06-25 2021-09-17 Oppo广东移动通信有限公司 网络切片服务的请求方法、装置、终端及存储介质
CN113630783A (zh) * 2020-05-07 2021-11-09 华为技术有限公司 一种通信方法及装置
WO2022035512A1 (en) * 2020-08-12 2022-02-17 Apple Inc. Steering of roaming check during mobility registration
CN114125809A (zh) * 2021-10-28 2022-03-01 展讯通信(上海)有限公司 切片服务获取方法及相关装置

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20210282084A1 (en) * 2020-03-09 2021-09-09 Qualcomm Incorporated Slice-aware plmn selection
CN113630783A (zh) * 2020-05-07 2021-11-09 华为技术有限公司 一种通信方法及装置
WO2022035512A1 (en) * 2020-08-12 2022-02-17 Apple Inc. Steering of roaming check during mobility registration
CN113411781A (zh) * 2021-06-25 2021-09-17 Oppo广东移动通信有限公司 网络切片服务的请求方法、装置、终端及存储介质
CN114125809A (zh) * 2021-10-28 2022-03-01 展讯通信(上海)有限公司 切片服务获取方法及相关装置

Also Published As

Publication number Publication date
CN117641514A (zh) 2024-03-01

Similar Documents

Publication Publication Date Title
US20240224170A1 (en) Network selection method and apparatus, terminal, and network-side device
WO2023143422A1 (zh) 灾难漫游的控制方法、装置、终端及网络侧设备
US20230199633A1 (en) Network selection method, information sending method, information obtaining method, and apparatus
WO2024037512A1 (zh) 网络接入方法、装置、终端及通信设备
CN117939560A (zh) 执行结果上报方法、接收方法、终端及网络侧设备
WO2024032537A1 (zh) 通信方法、设备及可读存储介质
WO2023213242A1 (zh) Ue策略信息的配置方法、装置、第一网络功能及终端
WO2024037632A1 (zh) 通信方法、终端及网络侧设备
US20240381288A1 (en) Disaster roaming control method and apparatus, terminal, and network side device
WO2024022398A1 (zh) 托管网络的选网信息的获取方法、终端及网络侧设备
WO2023131286A1 (zh) 资源控制方法、装置、终端、网络侧设备及可读存储介质
WO2023185810A1 (zh) 终端路由选择策略ursp确定方法、终端及网络侧设备
WO2024208125A1 (zh) Srs配置方法、装置及相关设备
WO2024017023A1 (zh) 允许的nssai的获取方法、终端及网络侧设备
WO2024032543A1 (zh) 信息获取方法、终端及接入网设备
WO2024169805A1 (zh) 配置更新方法、配置更新装置、终端及网络侧设备
WO2024104077A1 (zh) 信息传输方法、装置、通信设备及可读存储介质
WO2024051565A1 (zh) 选网处理方法、装置、终端及可读存储介质
WO2023143423A1 (zh) 信息获取与存储、上报方法、装置、终端及网络功能
WO2023179571A1 (zh) 非公共网络接入方法、装置及终端
WO2023185728A1 (zh) 业务处理方法、装置、终端、网络侧设备及可读存储介质
WO2023165481A1 (zh) 网络故障的处理方法、终端、接入网设备及核心网设备
WO2024017244A1 (zh) 信息发送方法、信息接收方法、装置及相关设备
WO2023109686A1 (zh) 参数配置方法、装置、通信设备、存储介质及系统
US20240267799A1 (en) Cell reselection method and apparatus, and related device

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 23854413

Country of ref document: EP

Kind code of ref document: A1