CN112655182B - Communication method and device - Google Patents

Communication method and device Download PDF

Info

Publication number
CN112655182B
CN112655182B CN201880097268.8A CN201880097268A CN112655182B CN 112655182 B CN112655182 B CN 112655182B CN 201880097268 A CN201880097268 A CN 201880097268A CN 112655182 B CN112655182 B CN 112655182B
Authority
CN
China
Prior art keywords
network
terminal device
service
core network
identifier
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201880097268.8A
Other languages
Chinese (zh)
Other versions
CN112655182A (en
Inventor
刘建华
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guangdong Oppo Mobile Telecommunications Corp Ltd
Original Assignee
Guangdong Oppo Mobile Telecommunications Corp Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guangdong Oppo Mobile Telecommunications Corp Ltd filed Critical Guangdong Oppo Mobile Telecommunications Corp Ltd
Publication of CN112655182A publication Critical patent/CN112655182A/en
Application granted granted Critical
Publication of CN112655182B publication Critical patent/CN112655182B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/40Network security protocols

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The embodiment of the application relates to a communication method and equipment, wherein the method comprises the following steps: the method comprises the steps that a terminal device obtains a first identifier accessed to a first network, wherein the first network is an unshared core network deployed by an operator, and the terminal device signs up with a Public Land Mobile Network (PLMN); the terminal device accesses the first network based on the first identification. The communication method and the device of the embodiment of the application can enable the terminal device signed with the PLMN to access the TAN.

Description

Communication method and device
Technical Field
The present application relates to the field of communications, and in particular, to a communication method and apparatus.
Background
New wireless (NR) systems (or 5G systems, 5G networks) introduce an operator deployed, non-public core network.
Typically, the terminal device will move continuously. When the terminal equipment of the public land mobile network (Public Land Mobile Network, PLMN) enters the coverage area of the operator deployed non-public core network, there is no clear provision for how to access the terminal equipment subscribed to the PLMN to the operator deployed non-public core network.
Disclosure of Invention
The embodiment of the application provides a communication method and equipment, which can enable terminal equipment signed with PLMN to access an unshared core network deployed by an operator.
In a first aspect, a communication method is provided, the method comprising: the method comprises the steps that a terminal device obtains a first identifier accessed to a first network, wherein the first network is an unshared core network deployed by an operator, and the terminal device signs up with a Public Land Mobile Network (PLMN);
the terminal equipment accesses the first network based on the first identifier.
In a second aspect, there is provided a communication method, the method comprising: the core network equipment receives a second request message sent by the terminal equipment, wherein the second request message comprises a first identifier of the terminal equipment accessed to a first network and an identifier of the terminal equipment, the first network is an unshared core network deployed by an operator, and the terminal equipment has subscription with a Public Land Mobile Network (PLMN);
the core network device sends a second request response message to the terminal device, where the second request response message is used to indicate whether the terminal device is allowed to access the first network.
In a third aspect, a communication method is provided, the method comprising: the method comprises the steps that first equipment receives a first request message sent by terminal equipment, wherein the first request message is used for requesting to access a first identifier of a first network, the first network is an unshared core network deployed by an operator, and the terminal equipment has a subscription relationship with a Public Land Mobile Network (PLMN);
The first device sends a first request response message to the terminal device, wherein the first request response message comprises the first identifier.
In a fourth aspect, a terminal device is provided for performing the method of the first aspect or each implementation manner thereof.
Specifically, the terminal device comprises functional modules for performing the method of the first aspect or its implementation manner.
In a fifth aspect, a core network device is provided for performing the method of the second aspect or implementations thereof.
Specifically, the core network device comprises functional modules for performing the method of the second aspect or implementations thereof.
In a sixth aspect, a communication device is provided for performing the method of the third aspect or implementations thereof.
Specifically, the communication device comprises functional modules for performing the method of the third aspect or implementations thereof.
In a seventh aspect, a terminal device is provided, comprising a processor and a memory. The memory is used for storing a computer program, and the processor is used for calling and running the computer program stored in the memory and executing the method in the first aspect or various implementation manners thereof.
In an eighth aspect, a core network device is provided that includes a processor and a memory. The memory is for storing a computer program and the processor is for calling and running the computer program stored in the memory for performing the method of the second aspect or implementations thereof described above.
In a ninth aspect, a communication device is provided that includes a processor and a memory. The memory is for storing a computer program and the processor is for calling and running the computer program stored in the memory for performing the method of the third aspect or implementations thereof.
In a tenth aspect, a chip is provided for implementing the method in any one of the first to third aspects or each implementation thereof.
Specifically, the chip includes: a processor for calling and running a computer program from a memory, causing a device on which the chip is mounted to perform the method as in any one of the first to third aspects or implementations thereof described above.
In an eleventh aspect, a computer-readable storage medium is provided for storing a computer program for causing a computer to perform the method of any one of the above first to third aspects or implementations thereof.
In a twelfth aspect, there is provided a computer program product comprising computer program instructions for causing a computer to perform the method of any one of the above first to third aspects or implementations thereof.
In a thirteenth aspect, there is provided a computer program which, when run on a computer, causes the computer to perform the method of any one of the above-described first to third aspects or implementations thereof.
According to the technical scheme, when the terminal equipment signed with the PLMN enters the non-public core network deployed by the operator, the terminal equipment can obtain the identifier of the non-public core network deployed by the access operator, so that the terminal equipment can access the non-public core network deployed by the operator based on the obtained identifier.
Drawings
Fig. 1 is a schematic diagram of a communication system architecture according to an embodiment of the present application.
Fig. 2 is a schematic flow chart of a communication method provided in an embodiment of the present application.
Fig. 3 is a schematic flow chart of another communication method provided by an embodiment of the present application.
Fig. 4 is a schematic flow chart of another communication method provided by an embodiment of the present application.
Fig. 5 is a specific schematic interaction diagram of a communication method according to an embodiment of the present application.
Fig. 6 is a schematic block diagram of a terminal device according to an embodiment of the present application.
Fig. 7 is a schematic block diagram of a core network device according to an embodiment of the present application.
Fig. 8 is a schematic block diagram of a communication device according to an embodiment of the present application.
Fig. 9 is a schematic block diagram of a communication device according to an embodiment of the present application.
Fig. 10 is a schematic block diagram of a chip according to an embodiment of the application.
Fig. 11 is a schematic block diagram of a communication system according to an embodiment of the present application.
Detailed Description
The following description of the technical solutions according to the embodiments of the present application will be given with reference to the accompanying drawings in the embodiments of the present application, and it is apparent that the described embodiments are some embodiments of the present application, but not all embodiments. All other embodiments, which can be made by those skilled in the art based on the embodiments of the application without making any inventive effort, are intended to be within the scope of the application.
The technical scheme of the embodiment of the application can be applied to various communication systems, such as: global system for mobile communications (Global System of Mobile communication, GSM), code division multiple access (Code Division Multiple Access, CDMA), wideband code division multiple access (Wideband Code Division Multiple Access, WCDMA) systems, general packet radio service (General Packet Radio Service, GPRS), long term evolution (Long Term Evolution, LTE) systems, LTE frequency division duplex (Frequency Division Duplex, FDD) systems, LTE time division duplex (Time Division Duplex, TDD), universal mobile telecommunications system (Universal Mobile Telecommunication System, UMTS), worldwide interoperability for microwave access (Worldwide Interoperability for Microwave Access, wiMAX) communication systems or 5G systems, or later versions of communication systems.
Fig. 1 illustrates a wireless communication system 100 in which embodiments of the present application may be used. The wireless communication system 100 may include an access network device 110. The access network device 110 may be a device that communicates with a terminal device. The access network device 110 may provide communication coverage for a particular geographic area and may communicate with terminal devices located within the coverage area. Alternatively, the access network device 110 may be a next generation radio access network (Next Generation Radio Access Network, NG RAN), or a base station (gNB) in an NR system, or a radio controller in a cloud radio access network (Cloud Radio Access Network, CRAN), or the access network device 110 may be a mobile switching center, a relay station, an access point, an in-vehicle device, a wearable device, a hub, a switch, a bridge, a router, a network-side device in a 5G network, or a network device in a future evolved public land mobile network (Public Land Mobile Network, PLMN), or the like. Alternatively, the access network device 110 may also be a base station in an LTE system, e.g. an evolved universal terrestrial radio access network (Evolved Universal Terrestrial Radio Access Network, E-UTRAN) device.
The wireless communication system 100 further comprises at least one terminal device 120 located within the coverage area of the access network device 110. The terminal device 120 may be mobile or stationary. Optionally, as used herein, "terminal device" includes, but is not limited to, connection via wireline, such as via public-switched telephone network (Public Switched Telephone Networks, PSTN), digital subscriber line (Digital Subscriber Line, DSL), digital cable, direct cable connection; and/or another data connection/network; and/or via a wireless interface, e.g., for a cellular network, a wireless local area network (Wireless Local Area Network, WLAN), a digital television network such as a DVB-H network, a satellite network, an AM-FM broadcast transmitter; and/or means of the other terminal device arranged to receive/transmit communication signals; and/or internet of things (Internet of Things, ioT) devices. Terminal devices arranged to communicate over a wireless interface may be referred to as "wireless communication terminals", "wireless terminals" or "mobile terminals". Examples of mobile terminals include, but are not limited to, satellites or cellular telephones; a personal communications system (Personal Communications System, PCS) terminal that may combine a cellular radiotelephone with data processing, facsimile and data communications capabilities; PDA's that may include a radiotelephone, pager, internet/intranet access, web browser, organizer, calendar, beidou satellite navigation system (BeiDou Navigation Satellite System, BDS), and global positioning system (Global Positioning System, GPS) receiver; and conventional laptop and/or palmtop receivers or other electronic devices that include a radiotelephone transceiver. A terminal device may refer to an access terminal, user Equipment (UE), subscriber unit, subscriber station, mobile station, remote terminal, mobile device, user terminal, wireless communication device, user agent, or User Equipment. An access terminal may be a cellular telephone, a cordless telephone, a session initiation protocol (Session Initiation Protocol, SIP) phone, a wireless local loop (Wireless Local Loop, WLL) station, a personal digital assistant (Personal Digital Assistant, PDA), a handheld device with wireless communication capabilities, a computing device or other processing device connected to a wireless modem, an in-vehicle device, a wearable device, a terminal device in a 5G network or a terminal device in a future evolved PLMN, etc.
The wireless communication system 100 further comprises a core network device 130 in communication with the access network device. Alternatively, the core network device 130 may be a 5G core network device, for example, an access and mobility management function (Access and Mobility Management Function, AMF), responsible for access and mobility management, having functions of authentication, handover, location update, etc. for a user. As another example, session management functions (Session Management Function, SMF) are responsible for session management, including establishment, modification, release, etc. of Packet Data Unit (PDU) sessions. As another example, a user plane function (User Plane Function, UPF) is responsible for forwarding user data.
Optionally, direct terminal (D2D) communication may be performed between the terminal devices.
Fig. 1 illustrates an access network device, a core network device, and two terminal devices, alternatively, the wireless communication system 100 may include multiple access network devices and each access network device may include other numbers of terminal devices within a coverage area, which is not limited by the embodiment of the present application.
Optionally, the wireless communication system 100 may further include other network entities such as a mobility management entity (Mobile Management Entity, MME), unified data management (Unified Data Management, UDM), authentication server function (Authentication Server Function, AUSF), UPF, signaling gateway (Signaling Gateway, SGW), and the like, which are not limited by the embodiments of the present application. Fig. 1 illustrates one network device and two terminal devices by way of example, and the communication system 100 may alternatively include multiple network devices and may include other numbers of terminal devices within the coverage area of each network device, as embodiments of the application are not limited in this regard.
Fig. 2 is a schematic flow chart of a communication method 200 according to an embodiment of the application, wherein the method may be performed by a terminal device. The method 200 includes at least some of the following.
In 210, the terminal device obtains a first identity for accessing the first network.
The first network is an unshared core network deployed by an operator, and the terminal equipment has subscription with the PLMN.
In 220, the terminal device accesses the first network based on the first identification.
Fig. 3 is a schematic flow chart of a communication method 300 according to an embodiment of the application, wherein the method may be performed by a core network device. The method 300 includes at least some of the following.
In 310, the core network device receives a second request message sent by the terminal device.
The second request message may include a first identifier of the terminal device accessing the first network and an identifier of the terminal device, where the first network is an unshared core network deployed by an operator, and the terminal device has a subscription with the PLMN.
In 320, the core network device sends a second request response message to the terminal device. Wherein the second request response message is used to indicate whether the terminal device is allowed to access the first network.
Fig. 4 is a schematic flow chart of a communication method 400 according to an embodiment of the application, wherein the method may be performed by a first device. The method 400 includes at least some of the following.
In 410, the first device receives a first request message sent by a terminal device.
The first request message is used for requesting to access a first identifier of a first network, the first network is an unshared core network deployed by an operator, and the terminal equipment has subscription with the PLMN.
In 420, the first device sends a first request response message to the terminal device, the first request response message including the first identity.
The communication method of the embodiment of the present application will be further described with reference to fig. 2 to 4. It should be understood that what is described below applies both to method 200 and to methods 300 and 400.
Alternatively, in the embodiment of the present application, the first Network may be, for example, a Type-a Network (TAN).
NR systems introduce vertical industry local area networks (Vertical Local Access Network, VLAN). VLAN networks may also be referred to as non-public networks that provide non-public services. The VLAN Network may be a TAN and a Type-b Network (TBN), where the TAN may access a PLMN, provide PLMN services for UEs accessing the TAN, and the TBN may not access the PLMN, and may not provide PLMN services for UEs accessing the TBN. When the TAN performs data transmission, the TAN may transmit data to an external network, or may perform data transmission only inside the TAN. However, when the TBN performs data transmission, the data transmission can be performed only inside the TBN, and there is no connection with the outside. The UPF of the TAN and a Data Network (DN) outside the PLMN Network may be connected through an interface N6. However, the UPF of the TBN will not connect to DNs outside the PLMN network.
It should be noted that the names of TAN and TBN in the embodiments of the present application are not limited, that is, they may be expressed as other names.
Optionally, the first identification is an ID that can access the first network. For example, the first identification may be a verification code. One terminal device may correspond to at least one first identifier, and one first identifier may also correspond to at least one terminal device.
There are many ways in which the terminal device obtains the first identifier that is accessed to the first network, and embodiments of the present application are not limited in detail.
In one implementation, the terminal device obtains a first identifier of accessing to the first network, which may include: the terminal device sends a first request message to the first device, where the first request message may be used to request the first identifier, and the request message may include the identifier of the terminal device. After receiving the first request message, the first device may assign a first identifier to the terminal device. Thereafter, the first device may send a first request response message to the terminal device, the first request response message including the first identity. After the terminal device receives the first request response message, the terminal device may determine the first identity based on the first request response message.
Alternatively, the identity of the terminal device may include, but is not limited to, an international mobile subscriber identity (International Mobile Subscriber Identification Number, IMSI), a UE ID, an international mobile equipment identity (International Mobile Equipment Identity, IMEI). When the terminal equipment is a mobile phone, the identifier of the terminal equipment can also be the mobile phone number of the terminal equipment.
Alternatively, the first device may be a core network device, an application server or a user device.
Optionally, after receiving the first request message, the first device may further determine a validity duration of the first identifier. For example, the effective duration of the first identifier is 30s. At this time, the first request response message may include the valid duration of the first identifier.
Optionally, after the first device allocates the first identifier to the terminal device, a correspondence relationship between the identifier of the terminal device reported by the terminal device and the first identifier may be saved.
In another implementation, when the first device is an application server, the terminal device may obtain the first identifier through interaction inside the application.
As an example, the terminal device may apply for the first identifier on an application, i.e. the terminal device may send a data packet to the application server, and after the application server allocates the first identifier to the terminal device, the first identifier may be transmitted to the terminal device through the data packet.
In another implementation, the terminal device may obtain the first identifier through communication between user devices.
For example, when the first identifier is the verification code, the first user equipment can tell the second user equipment the verification code, and the second user equipment inputs the verification code into the terminal equipment after obtaining the verification code, so that the terminal equipment can obtain the verification code.
Optionally, the method of the embodiment of the present application may further include: the terminal device receives a broadcast message sent by an access network device of the first network, where the broadcast message may include an identification of the first network.
Optionally, the broadcast message may further comprise indication information allowing a terminal device subscribed to the PLMN to access the first network.
After the terminal equipment reads the identifier of the first network, the identifier of the first network is compared with the stored identifier of the first network, if the read identifier of the first network is the same as the stored identifier of the first network, the terminal equipment can determine that the current position is covered by the first network, and the terminal equipment can initiate registration to the first network. For convenience of description, the following description refers to the identification of the first network stored by the terminal device as the identification 1 of the first network.
Alternatively, the identifier 1 of the first network may be obtained by the first identifier, i.e. the first identifier may include the identifier 1 of the first network.
Alternatively, the identification 1 of the first network may be preconfigured on the terminal device.
Alternatively, the identity 1 of the first network may be obtained by the terminal device from a certain application.
After the terminal device establishes connection with the access network device of the first network, if the first identifier is within the effective duration, the terminal device may send a second request message to the core network device, where the second request message may include the first identifier and the identifier of the terminal device. After the core network device receives the second request message, it may be determined whether to allow the terminal device to access the first network. The core network device may then send a second request response message to the terminal device, the second request response message indicating whether the terminal device is allowed to access the first network.
If the second request response message indicates that the terminal device is allowed to access the first network, the terminal device may access the first network.
It should be understood that the core network device in the embodiment of the present application is a core network device of the first network.
Alternatively, the second request message may be a registration request message, or may be a Non-Access Stratum (NAS) message carrying a session establishment request message.
In one possible embodiment, the core network device determining whether to allow the terminal device to access the first network may include: and the core network equipment determines whether the terminal equipment is allowed to access the first network according to the first identifier and the identifier of the terminal equipment.
In particular, the core network device may determine whether the terminal device has a subscription with the PLMN. If the terminal device has a subscription with the PLMN, the core network device may send a verification request message to the first device, where the verification request message may include a first terminal device identifier and a first identifier. The first device performs verification on the terminal device based on the first terminal device identifier and the first identifier, and after a verification result is obtained, a verification response message can be sent to the core network device, where the verification response message includes the verification result. The core network device may then determine whether to allow the terminal device to access the first network based on the verification result.
The core network device determines whether the terminal device has a subscription with the PLMN, which may include, as an example: the terminal device sends first indication information to the core network device, wherein the first indication information can be used for indicating that the terminal device has subscription with the PLMN. The core network device may determine, according to the first indication information, that the terminal device has a subscription with the PLMN.
Alternatively, the first indication information may be carried in the second request message.
Alternatively, the first indication information may indicate, through at least one bit, whether the terminal device has a subscription with the PLMN.
For example, the first indication information may indicate that the terminal device has not subscribed to the PLMN through a bit "0", and indicate that the terminal device has subscribed to the PLMN through a bit "1".
Further, as an example, the number of bits of the first indication information may be multiple, which indicates that the terminal device has a subscription with the PLMN if the multiple bits are the same, and indicates that the terminal device has no subscription with the PLMN if at least two bits of the multiple bits are different. For example, "000" indicates that the terminal device has a subscription with the PLMN, and "010" indicates that the terminal device has no subscription with the PLMN.
It should be understood that the specific examples of the embodiments of the present application are intended to facilitate a better understanding of the embodiments of the present application by those skilled in the art, and are not intended to limit the scope of the embodiments of the present application.
Optionally, the first indication information may indicate, through a first parameter, whether the terminal device has a subscription with the PLMN.
For example, if the first indication information includes the first parameter, it indicates that the terminal device has a subscription with the PLMN; if the first indication information does not include the first parameter, the terminal equipment is not signed with the PLMN.
It should be noted that, the embodiment of the present application does not specifically limit the first parameter, and any parameter that can indicate whether the terminal device has a subscription with the PLMN is included in the protection scope of the present application.
Alternatively, the first indication information may be identification information of the terminal device. Namely, the core network device can determine whether the terminal device has subscription with the PLMN by identifying the identifier of the terminal device.
In a possible embodiment, the first device performs verification on the terminal device based on the first terminal device identifier and the first identifier, and may include: the first device stores a second identifier and an identifier of the terminal device, wherein the second identifier is an identifier of the terminal device accessing the first network. And then, the first device can determine whether the second identifier and the identifier of the terminal device are consistent with the identifier of the first terminal device and the first identifier reported by the core network device. If so, the first device may allow the terminal device to access the first network; if not, the first device does not allow the terminal device to access the first network.
For example, the second identifier stored by the first device is ID 1, the identifier of the terminal device is ID 2, the ID 1 corresponds to ID 2, the first identifier reported by the core network device is ID 1', and the identifier of the first terminal device is ID 2', where the first device checks whether the IDs 1 'and ID 2' reported by the core network device are stored. If the first device determines that the ID 1 'is the same as the ID 1 and the ID 2' is the same as the ID 2, the first device checks and saves the IDs 1 'and the IDs 2' reported by the core network device. The first device can detect whether the corresponding relation between the ID 1 'and the ID 2' is always the same as the corresponding relation between the ID 1 and the ID 2, and if so, the first device determines that the terminal device can access the first network; if the first network is inconsistent, the first device determines that the terminal device cannot access the first network.
If the first device determines that the terminal device can access the first network, the method of the embodiment of the application further includes: the method comprises the steps that first equipment determines effective duration of access of the terminal equipment to a first network and/or first service of access of the terminal equipment is allowed, wherein the first service is the service of the first network accessed by the terminal equipment. For example, the first service may be surfing the internet or sending a short message.
Optionally, the verification response message may include an effective duration of the terminal device accessing the first network and/or a first service allowed to be accessed by the terminal device.
As an example, the first device may determine the effective duration of the terminal device accessing the first network according to the traffic of the first network at the current moment.
For example, if the traffic of the first network at the current moment is large, the effective duration of the terminal device accessing the first network may be short, for example, 1 hour; if the traffic of the first network is smaller at the current moment, the effective duration of the terminal device accessing the first network may be longer, for example, 2 hours.
As yet another example, the first device may determine an effective duration for the terminal device to access the first network based on the preset value.
Alternatively, the preset value may be protocol-specified. The effective duration of the terminal device accessing the first network is 2 hours as specified by the protocol.
Optionally, the first service allowed to be accessed by the terminal device included in the verification response message may be a service type and an identifier of the first service.
Alternatively, the identification may be, for example, an application name, a data network name (Data Network Name, DNN), single network slice selection assistance information (Single Network Slice Selection Assistance Information, S-NSSAI).
The method of the embodiment of the application can also comprise the following steps: the core network device invokes a subscription request service to the UDM of the PLMN, wherein the subscription request service is used for requesting subscription information of the terminal device; the core network device receives a subscription request response service called by the UDM, wherein the subscription request response service comprises third indication information, the third indication information can be used for indicating a second service which allows the terminal device to access, and the second service is a service of a PLMN which is accessed by the terminal device through the first network. For example, the second service may be a Voice call, a Long Term Evolution Voice bearer (VoLTE), or the like.
Optionally, the core network device may obtain the identifier of the PLMN from the identifier of the terminal device, and then invoke the subscription request service to the UDM of the PLMN based on the identifier of the PLMN.
Alternatively, the third indication information may indicate the second service to which the terminal device is allowed to access by indicating a service type and an identification of the second service.
Alternatively, the service identity of the second service may be, for example, the application name, DNN and S-NSSAI.
After the core network device acquires the first service and the second service which allow the terminal device to access, optionally, the method of the embodiment of the present application may further include: the terminal equipment receives second indication information sent by the core network equipment, wherein the second indication information is used for indicating the first service and/or the second service which are allowed to be accessed by the terminal equipment.
Optionally, the third indication information may be carried in the second request response message.
Optionally, after the core network device sends the second request response message to the terminal device, a NAS message may be sent to the terminal device, and the third indication information may be carried in the NAS message.
It should be understood that in the embodiments of the present application, "first", "second" and "third" are merely for distinguishing different objects, and do not limit the scope of the embodiments of the present application.
It should also be understood that the term "and/or" is merely one association relationship describing the associated object, and means that three relationships may exist, for example, a and/or B may mean: a exists alone, A and B exist together, and B exists alone.
Fig. 5 provides a detailed schematic of an embodiment of the present application. In fig. 5, the first network is TAN, the first identifier is a first ID, the terminal device subscribed to the PLMN is PLMN UE, the identifier of the PLMN UE is IMSI, the access network device of the first network is radio access network (Radio Access Network, RAN) -a, and the core network device of the first network is AMF-a.
In 510, the PLMN UE sends a first request message to the first device requesting access to a first ID of the TAN. The first request message includes an IMSI.
After receiving the first request message, the first device allocates a first ID and the effective duration of the first ID for the PLMN UE, and stores the corresponding relation between the first ID and the IMSI.
In 520, the first device sends a first request response message to the PLMN UE, the first request response message including the first ID, a validity duration of the first ID.
In 530, RAN-a broadcasts the TAN ID.
Optionally, the RAN-a may also broadcast an indication that the PLMN UE is allowed to access the TAN.
In 540, if the first ID is still within the valid period, the PLMN UE sends a second request message to AMF-a.
The second request message may include an IMSI, a first ID, and indication information indicating that the UE is a PLMN UE.
Alternatively, the second request message may be a registration request message or a NAS message carrying a PDU session establishment request message.
If the AMF-a recognizes that the UE is PLMN UE, the AMF-a checks the access of the PLMN UE and acquires the PLMN ID from the IMSI.
In 541, AMF-a invokes a subscription request service to the UDM of the PLMN based on the PLMN ID and the UDM invokes a subscription request response service to the core network device.
Alternatively, the subscription request response service may indicate that the PLMN UE is allowed to access the PLMN service and the id+dnn+s-nsai of the service through the TAN.
In 550, the AMF-a sends a check request message to the first device, the check request message including the IMSI and the first ID.
After receiving the verification request message, the first device verifies whether the PLMN UE can access the TAN, and if the PLMN UE can access the TAN, the first device determines the effective duration of the PLMN UE that can access the TAN and the service type and ID of the TAN that can be accessed.
In 560, the first device sends a check response message to AMF-a, where the check response message includes the IMSI, the first ID, the effective duration for which the TAN can be accessed, and the service type and ID of the TAN that the PLMN UE is allowed to access.
In 570, the AMF-a sends a second request response message to the PLMN UE.
The second request response message includes the first ID, the check result, the valid duration of the access to the TAN, the service type and ID of the TAN that allows the PLMN UE to access, and the service type and ID of the PLMN that allows the PLMN UE to access through the TAN.
According to the embodiment of the application, when the terminal equipment signed with the PLMN enters the non-public core network deployed by the operator, the terminal equipment can obtain the identifier of the non-public core network deployed by the access operator, so that the terminal equipment can access the non-public core network deployed by the operator based on the obtained identifier.
It should be understood that, in various embodiments of the present application, the sequence numbers of the foregoing processes do not mean the order of execution, and the order of execution of the processes should be determined by the functions and internal logic thereof, and should not constitute any limitation on the implementation process of the embodiments of the present application.
Having described the communication method according to the embodiment of the present application in detail above, an apparatus according to the embodiment of the present application will be described below with reference to fig. 6 to 9, and technical features described in the method embodiment are applicable to the following apparatus embodiments.
Fig. 6 shows a schematic block diagram of a terminal device 600 of an embodiment of the application. As shown in fig. 6, the terminal device 600 includes:
the processing unit 610 is configured to obtain a first identifier of a first network, where the first network is an public core network deployed by an operator, and the terminal device 600 has a subscription with a PLMN.
The processing unit 610 is further configured to access the first network based on the first identification.
Optionally, in an embodiment of the present application, the terminal device 600 further includes: a communication unit 620, configured to send a first request message to the first device, where the first request message is used to request a first identifier, and the request message includes an identifier of the terminal device 600;
the communication unit 620 is further configured to receive a first request response message sent by the first device, where the first request response message includes the first identifier.
Optionally, in an embodiment of the present application, the first request response message further includes a valid duration of the first identifier.
Optionally, in an embodiment of the present application, the first device is a core network device, an application server, or a user device.
Optionally, in an embodiment of the present application, the terminal device 600 further includes: a communication unit 620, configured to send a second request message to the core network device, where the second request message includes the first identifier and the identifier of the terminal device 600;
the communication unit 620 is further configured to receive a second request response message sent by the core network device, where the second request response message is used to indicate whether the terminal device 600 is allowed to access the first network.
Optionally, in the embodiment of the present application, the second request message further includes first indication information, where the first indication information is used to indicate that the terminal device 600 has a subscription with the PLMN.
Optionally, in an embodiment of the present application, the second request response message includes an effective duration of the terminal device 600 accessing the first network.
Optionally, in an embodiment of the present application, the terminal device 600 further includes: a communication unit 620, configured to receive second indication information sent by the core network device, where the second indication information is used to indicate a first service and/or a second service that allow the terminal device 600 to access, where the first service is a service of a first network that the terminal device 600 accesses, and the second service is a service of a PLMN that the terminal device 600 accesses through the first network.
Optionally, in an embodiment of the present application, the core network device is a core network device of the first network.
It should be understood that the terminal device 600 may correspond to a terminal device in the method 200, and the corresponding operation of the terminal device in the method 200 may be implemented, which is not described herein for brevity.
Fig. 7 shows a schematic block diagram of a core network device 700 of an embodiment of the application. As shown in fig. 7, the core network device 700 includes:
and a communication unit 710, configured to receive a second request message sent by the terminal device, where the second request message includes a first identifier of the terminal device accessing a first network and an identifier of the terminal device, the first network is an public core network deployed by an operator, and the terminal device has a subscription with the PLMN.
The communication unit 710 is further configured to send a second request response message to the terminal device, where the second request response message is used to indicate whether the terminal device is allowed to access the first network.
Optionally, in an embodiment of the present application, the core network device 700 further includes: a processing unit 720, configured to determine whether to allow the terminal device to access the first network according to the first identifier and the identifier of the terminal device.
Optionally, in the embodiment of the present application, the communication unit 710 is specifically configured to: sending a verification request message to first equipment, wherein the verification request message comprises a first terminal equipment identifier and a first identifier;
receiving a check response message sent by the first equipment, wherein the check response message comprises a check result of whether the terminal equipment is allowed to access the first network;
the processing unit 720 is specifically configured to: based on the verification result, it is determined whether the terminal device is allowed to access the first network.
Optionally, in the embodiment of the present application, the check response message further includes an effective duration of the terminal device accessing the first network and/or a first service allowed to be accessed by the terminal device, where the first service is a service of the first network accessed by the terminal device.
Optionally, in an embodiment of the present application, the first device is a core network device, an application server, or a user device.
Optionally, in an embodiment of the present application, the core network device 700 further includes: a processing unit 720, configured to determine whether the terminal device has a subscription with the PLMN.
Optionally, in an embodiment of the present application, the processing unit 720 is specifically configured to: and determining whether the terminal equipment has subscription with the PLMN or not based on first indication information, wherein the first indication information is used for indicating that the terminal equipment has subscription with the PLMN.
Optionally, in an embodiment of the present application, the first indication information is identification information of the terminal device.
Optionally, in an embodiment of the present application, the core network device 700 further includes: a processing unit 720, configured to invoke a subscription request service to a UDM of the PLMN, where the subscription request service is used to request subscription information of the terminal device;
the communication unit 710 is further configured to: and receiving a subscription request response service called by the UDM, wherein the subscription request response service comprises third indication information, the third indication information is used for indicating a second service which allows the terminal equipment to access, and the second service is a service of a PLMN which is accessed by the terminal equipment through the first network.
Optionally, in an embodiment of the present application, the communication unit 710 is further configured to: and sending second indication information to the terminal equipment, wherein the second indication information is used for indicating a first service and/or a second service which are/is allowed to be accessed by the terminal equipment, the first service is a service of a first network accessed by the terminal equipment, and the second service is a service of a PLMN accessed by the terminal equipment through the first network.
Optionally, in an embodiment of the present application, the second request response message includes an effective duration of the terminal device accessing the first network.
Optionally, in an embodiment of the present application, the core network device 700 is a core network device of the first network.
It should be understood that the core network device 700 may correspond to the core network device in the method 400, and the corresponding operation of the core network device in the method 400 may be implemented, which is not described herein for brevity.
Fig. 8 shows a schematic block diagram of a communication device 800 according to an embodiment of the application, which communication device 800 is the first device according to an embodiment of the application. As shown in fig. 8, the communication device 800 includes:
the communication unit 810 is configured to receive a first request message sent by a terminal device, where the first request message is used to request access to a first identifier of a first network, and the first network is an operator deployed non-public core network, and the terminal device has a subscription with a PLMN.
The communication unit 810 is further configured to send a first request response message to the terminal device, where the first request response message includes the first identifier.
Optionally, in an embodiment of the present application, the first request response message further includes a valid duration of the first identifier.
Optionally, in an embodiment of the present application, the communication unit 810 is further configured to: receiving a verification request message sent by core network equipment, wherein the verification request message comprises a first terminal equipment identifier and a first identifier;
the communication device 810 further includes: a processing unit 820, configured to verify the terminal device based on the first terminal device identifier and the first identifier, to obtain a verification result;
the processing unit 820 is further configured to determine whether to allow the terminal device to access the first network based on the verification result.
Optionally, in an embodiment of the present application, the first request message includes an identifier of the terminal device, and the processing unit 820 is further configured to: and storing a second identifier and an identifier of the terminal equipment, wherein the second identifier is the identifier of the terminal equipment accessed to the first network.
Optionally, in an embodiment of the present application, the processing unit 820 is specifically configured to: determining whether the stored second identifier and the identifier of the terminal equipment are consistent with the first terminal equipment identifier and the first identifier reported by the core network equipment;
if the access request is consistent, allowing the terminal equipment to access the first network; if the first network is inconsistent, the terminal equipment is not allowed to access the first network.
Optionally, in an embodiment of the present application, if the processing unit 820 determines to allow the terminal device to access the first network, the processing unit 820 is further configured to: and determining the effective duration of the terminal equipment accessing the first network.
Optionally, in an embodiment of the present application, the communication unit 810 is further configured to: and sending a verification response message to the core network equipment, wherein the verification response message comprises a verification result and the effective duration of the terminal equipment accessing the first network.
Optionally, in an embodiment of the present application, the check response message further includes a first service that allows the terminal device to access, where the first service is a service of a first network that the terminal device accesses.
Optionally, in an embodiment of the present application, the core network device is a core network device of the first network.
Optionally, in an embodiment of the present application, the first device is a core network device, an application server, or a user device.
It should be appreciated that the communication device 800 may correspond to a communication device in the method 500, and that the corresponding operations of the communication device in the method 500 may be implemented, which are not described herein for brevity.
Fig. 9 is a schematic block diagram of a communication device 900 according to an embodiment of the present application. The communication device 900 shown in fig. 9 comprises a processor 910, from which the processor 910 may call and run a computer program to implement the method in an embodiment of the application.
Optionally, as shown in fig. 9, the communication device 900 may also include a memory 920. Wherein the processor 910 may invoke and run a computer program from the memory 920 to implement the method in the embodiments of the present application.
Wherein the memory 920 may be a separate device from the processor 910 or may be integrated in the processor 910.
Optionally, as shown in fig. 9, the communication device 900 may further include a transceiver 930, and the processor 910 may control the transceiver 930 to communicate with other devices, and in particular, may send information or data to other devices, or receive information or data sent by other devices.
Wherein transceiver 930 may include a transmitter and a receiver. Transceiver 930 may further include antennas, the number of which may be one or more.
Optionally, the communication device 900 may be specifically a terminal device in the embodiment of the present application, and the communication device 900 may implement a corresponding flow implemented by the terminal device in each method in the embodiment of the present application, which is not described herein for brevity.
Optionally, the communication device 900 may be specifically a core network device in the embodiment of the present application, and the communication device 900 may implement corresponding flows implemented by the core network device in each method in the embodiment of the present application, which are not described herein for brevity.
Optionally, the communication device 900 may be specifically a first device in the embodiment of the present application, and the communication device 900 may implement a corresponding flow implemented by the first device in each method in the embodiment of the present application, which is not described herein for brevity.
Fig. 10 is a schematic structural view of a chip of an embodiment of the present application. The chip 1000 shown in fig. 10 includes a processor 1010, and the processor 1010 may call and run a computer program from a memory to implement the method in the embodiment of the present application.
Optionally, as shown in fig. 10, the chip 1000 may further include a memory 1020. Wherein the processor 1010 may call and run a computer program from the memory 1020 to implement the methods in embodiments of the present application.
The memory 1020 may be a separate device from the processor 1010 or may be integrated into the processor 1010.
Optionally, the chip 1000 may also include an input interface 1030. The processor 1010 may control the input interface 1030 to communicate with other devices or chips, and in particular, may obtain information or data sent by the other devices or chips.
Optionally, the chip 1000 may further include an output interface 1040. Wherein the processor 1010 may control the output interface 1040 to communicate with other devices or chips, and in particular, may output information or data to other devices or chips.
Optionally, the chip may be applied to a terminal device in the embodiment of the present application, and the chip may implement a corresponding flow implemented by the terminal device in each method in the embodiment of the present application, which is not described herein for brevity.
Optionally, the chip may be applied to the core network device in the embodiment of the present application, and the chip may implement a corresponding flow implemented by the core network device in each method of the embodiment of the present application, which is not described herein for brevity.
Optionally, the chip may be applied to the first device in the embodiment of the present application, and the chip may implement a corresponding flow implemented by the first device in each method in the embodiment of the present application, which is not described herein for brevity.
It should be understood that the chips referred to in the embodiments of the present application may also be referred to as system-on-chip chips, or the like.
It should be appreciated that the processor of an embodiment of the present application may be an integrated circuit chip having signal processing capabilities. In implementation, the steps of the above method embodiments may be implemented by integrated logic circuits of hardware in a processor or instructions in software form. The processor may be a general purpose processor, a digital signal processor (Digital Signal Processor, DSP), an application specific integrated circuit (Application Specific Integrated Circuit, ASIC), an off-the-shelf programmable gate array (Field Programmable Gate Array, FPGA) or other programmable logic device, discrete gate or transistor logic device, discrete hardware components. The disclosed methods, steps, and logic blocks in the embodiments of the present application may be implemented or performed. A general purpose processor may be a microprocessor or the processor may be any conventional processor or the like. The steps of the method disclosed in connection with the embodiments of the present application may be embodied directly in the execution of a hardware decoding processor, or in the execution of a combination of hardware and software modules in a decoding processor. The software modules may be located in a random access memory, flash memory, read only memory, programmable read only memory, or electrically erasable programmable memory, registers, etc. as well known in the art. The storage medium is located in a memory, and the processor reads the information in the memory and, in combination with its hardware, performs the steps of the above method.
It will be appreciated that the memory in embodiments of the application may be volatile memory or nonvolatile memory, or may include both volatile and nonvolatile memory. The nonvolatile Memory may be a Read-Only Memory (ROM), a Programmable ROM (PROM), an Erasable PROM (EPROM), an Electrically Erasable EPROM (EEPROM), or a flash Memory. The volatile memory may be random access memory (Random Access Memory, RAM) which acts as an external cache. By way of example, and not limitation, many forms of RAM are available, such as Static RAM (SRAM), dynamic RAM (DRAM), synchronous DRAM (SDRAM), double Data Rate SDRAM (Double Data Rate SDRAM), enhanced SDRAM (ESDRAM), synchronous DRAM (SLDRAM), and Direct RAM (DR RAM). It should be noted that the memory of the systems and methods described herein is intended to comprise, without being limited to, these and any other suitable types of memory.
It should be understood that the above memory is illustrative but not restrictive, and for example, the memory in the embodiments of the present application may be Static RAM (SRAM), dynamic RAM (DRAM), synchronous DRAM (SDRAM), double data rate SDRAM (DDR SDRAM), enhanced SDRAM (ESDRAM), synchronous Link DRAM (SLDRAM), direct RAM (DR RAM), and the like. That is, the memory in embodiments of the present application is intended to comprise, without being limited to, these and any other suitable types of memory.
Fig. 11 is a schematic block diagram of a communication system 1100 provided by an embodiment of the present application. As shown in fig. 11, the communication system 1100 includes a terminal device 1110, a core network device 1120, and a first device 1130.
The terminal device 1110 may be used to implement the corresponding function implemented by the terminal device in the above method, the core network device 1120 may be used to implement the corresponding function implemented by the core network device in the above method, and the first device 1130 may be used to implement the corresponding function implemented by the first device in the above method, which is not described herein for brevity.
The embodiment of the application also provides a computer readable storage medium for storing a computer program.
Optionally, the computer readable storage medium may be applied to a terminal device in the embodiment of the present application, and the computer program causes a computer to execute a corresponding flow implemented by the terminal device in each method in the embodiment of the present application, which is not described herein for brevity.
Optionally, the computer readable storage medium may be applied to the core network device in the embodiment of the present application, and the computer program causes a computer to execute a corresponding flow implemented by the core network device in each method of the embodiment of the present application, which is not described herein for brevity.
Optionally, the computer readable storage medium may be applied to the first device in the embodiment of the present application, and the computer program causes a computer to execute a corresponding flow implemented by the first device in each method in the embodiment of the present application, which is not described herein for brevity.
The embodiment of the application also provides a computer program product comprising computer program instructions.
Optionally, the computer program product may be applied to a terminal device in the embodiment of the present application, and the computer program instructions cause a computer to execute corresponding processes implemented by the terminal device in each method in the embodiment of the present application, which are not described herein for brevity.
Optionally, the computer program product may be applied to the core network device in the embodiment of the present application, and the computer program instructions cause the computer to execute the corresponding flow implemented by the core network device in each method of the embodiment of the present application, which is not described herein for brevity.
Optionally, the computer program product may be applied to the first device in the embodiment of the present application, and the computer program instructions cause the computer to execute a corresponding flow implemented by the first device in each method in the embodiment of the present application, which is not described herein for brevity.
The embodiment of the application also provides a computer program.
Optionally, the computer program may be applied to a terminal device in the embodiment of the present application, and when the computer program runs on a computer, the computer is caused to execute a corresponding flow implemented by the terminal device in each method in the embodiment of the present application, which is not described herein for brevity.
Optionally, the computer program may be applied to the core network device in the embodiment of the present application, and when the computer program runs on a computer, the computer is caused to execute a corresponding flow implemented by the core network device in each method in the embodiment of the present application, which is not described herein for brevity.
Optionally, the computer program may be applied to the first device in the embodiment of the present application, and when the computer program runs on a computer, the computer is caused to execute a corresponding flow implemented by the first device in each method in the embodiment of the present application, which is not described herein for brevity.
Those of ordinary skill in the art will appreciate that the various illustrative elements and algorithm steps described in connection with the embodiments disclosed herein may be implemented as electronic hardware, or combinations of computer software and electronic hardware. Whether such functionality is implemented as hardware or software depends upon the particular application and design constraints imposed on the solution. Skilled artisans may implement the described functionality in varying ways for each particular application, but such implementation decisions should not be interpreted as causing a departure from the scope of the present application.
It will be clear to those skilled in the art that, for convenience and brevity of description, specific working procedures of the above-described systems, apparatuses and units may refer to corresponding procedures in the foregoing method embodiments, and are not repeated herein.
In the several embodiments provided by the present application, it should be understood that the disclosed systems, devices, and methods may be implemented in other manners. For example, the apparatus embodiments described above are merely illustrative, e.g., the division of the units is merely a logical function division, and there may be additional divisions when actually implemented, e.g., multiple units or components may be combined or integrated into another system, or some features may be omitted or not performed. Alternatively, the coupling or direct coupling or communication connection shown or discussed with each other may be an indirect coupling or communication connection via some interfaces, devices or units, which may be in electrical, mechanical or other form.
The units described as separate units may or may not be physically separate, and units shown as units may or may not be physical units, may be located in one place, or may be distributed on a plurality of network units. Some or all of the units may be selected according to actual needs to achieve the purpose of the solution of this embodiment.
In addition, each functional unit in the embodiments of the present application may be integrated in one processing unit, or each unit may exist alone physically, or two or more units may be integrated in one unit.
The functions, if implemented in the form of software functional units and sold or used as a stand-alone product, may be stored in a computer-readable storage medium. Based on this understanding, the technical solution of the present application may be embodied essentially or in a part contributing to the prior art or in a part of the technical solution, in the form of a software product stored in a storage medium, comprising several instructions for causing a computer device (which may be a personal computer, a server, a network device, etc.) to perform all or part of the steps of the method according to the embodiments of the present application. And the aforementioned storage medium includes: a usb disk, a removable hard disk, a Read-Only Memory (ROM), a random access Memory (Random Access Memory, RAM), a magnetic disk, or an optical disk, or other various media capable of storing program codes.
The foregoing is merely illustrative of the present application, and the present application is not limited thereto, and any person skilled in the art will readily recognize that variations or substitutions are within the scope of the present application. Therefore, the protection scope of the present application shall be subject to the protection scope of the claims.

Claims (34)

1. A method of communication, the method comprising:
the method comprises the steps that a terminal device obtains a first identifier accessed to a first network, wherein the first network is an unshared core network deployed by an operator, and the terminal device signs up with a Public Land Mobile Network (PLMN);
the terminal equipment accesses the first network based on the first identifier;
the terminal device obtains a first identifier of accessing to a first network, including:
the terminal equipment sends a first request message to first equipment, wherein the first request message is used for requesting the first identifier, and the first request message comprises the identifier of the terminal equipment;
the terminal equipment receives a first request response message sent by the first equipment, wherein the first request response message comprises the first identifier, and the first request response message also comprises the effective duration of the first identifier;
The first device is an application server;
wherein the terminal device accesses the first network based on the first identifier, including:
the terminal equipment sends a second request message to core network equipment, wherein the second request message comprises the first identifier and the identifier of the terminal equipment;
the terminal equipment receives a second request response message sent by the core network equipment, wherein the second request response message is used for indicating whether the terminal equipment is allowed to access the first network.
2. The method of claim 1, wherein the second request message further includes first indication information, the first indication information being used to indicate that the terminal device has a subscription with a PLMN.
3. The method of claim 1, wherein the second request response message includes a valid duration for the terminal device to access the first network.
4. A method according to any one of claims 1 to 3, further comprising:
the terminal equipment receives second indication information sent by core network equipment, wherein the second indication information is used for indicating a first service and/or a second service which are allowed to be accessed by the terminal equipment, the first service is the service of the first network accessed by the terminal equipment, and the second service is the service of a PLMN accessed by the terminal equipment through the first network.
5. A method according to any one of claims 1 to 3, characterized in that the core network device is a core network device of the first network.
6. A method of communication, the method comprising:
the core network equipment receives a second request message sent by the terminal equipment, wherein the second request message comprises a first identifier of the terminal equipment accessed to a first network and an identifier of the terminal equipment, the first network is an unshared core network deployed by an operator, and the terminal equipment has subscription with a Public Land Mobile Network (PLMN);
the core network device sends a second request response message to the terminal device, wherein the second request response message is used for indicating whether the terminal device is allowed to access the first network;
wherein before the core network device sends the second request response message to the terminal device, the method further comprises:
the core network equipment determines whether the terminal equipment is allowed to access the first network according to the first identifier and the identifier of the terminal equipment;
the core network device determines whether to allow the terminal device to access the first network according to the first identifier and the identifier of the terminal device, including:
The core network device sends a verification request message to first equipment, wherein the verification request message comprises a first terminal equipment identifier and the first identifier;
the core network device receives a check response message sent by the first device, wherein the check response message comprises a check result of whether the terminal device is allowed to access the first network;
the core network device determines whether to allow the terminal device to access the first network based on the check result,
the first device is an application server.
7. The method according to claim 6, wherein the check response message further comprises an effective duration of the terminal device accessing the first network and/or a first service allowed to be accessed by the terminal device, wherein the first service is a service of the first network accessed by the terminal device.
8. The method of claim 6, wherein the method further comprises:
the core network device determines whether the terminal device has a subscription with a PLMN.
9. The method of claim 8, wherein the core network device determining whether the terminal device has a subscription with a PLMN comprises:
The core network device determines whether the terminal device has a subscription with the PLMN based on first indication information, where the first indication information is used to indicate that the terminal device has a subscription with the PLMN.
10. The method according to claim 9, wherein the first indication information is identification information of the terminal device.
11. The method according to any one of claims 6 to 10, further comprising:
the core network device invokes a subscription request service to a Unified Data Management (UDM) of the PLMN, wherein the subscription request service is used for requesting subscription information of the terminal device;
the core network device receives a subscription request response service called by the UDM, wherein the subscription request response service comprises third indication information, the third indication information is used for indicating a second service which is allowed to be accessed by the terminal device, and the second service is a service of a PLMN which is accessed by the terminal device through the first network.
12. The method according to any one of claims 6 to 10, further comprising:
the core network device sends second indication information to the terminal device, wherein the second indication information is used for indicating a first service and/or a second service which are/is allowed to be accessed by the terminal device, the first service is a service of the first network accessed by the terminal device, and the second service is a service of a PLMN accessed by the terminal device through the first network.
13. The method according to any of claims 6 to 10, wherein the second request response message comprises an effective duration for the terminal device to access the first network.
14. The method according to any of claims 6 to 10, wherein the core network device is a core network device of the first network.
15. A terminal device, comprising:
the processing unit is used for acquiring a first identifier accessed to a first network, wherein the first network is an unshared core network deployed by an operator, and the terminal equipment has subscription with a Public Land Mobile Network (PLMN);
the processing unit is further configured to access the first network based on the first identifier;
wherein, the terminal equipment still includes:
a communication unit, configured to send a first request message to a first device, where the first request message is used to request the first identifier, and the first request message includes an identifier of the terminal device;
the communication unit is further configured to receive a first request response message sent by the first device, where the first request response message includes the first identifier, and the first request response message further includes an effective duration of the first identifier;
The first device is an application server;
the communication unit is further configured to send a second request message to a core network device, where the second request message includes the first identifier and the identifier of the terminal device;
the communication unit is further configured to receive a second request response message sent by the core network device, where the second request response message is used to indicate whether the terminal device is allowed to access the first network.
16. The terminal device of claim 15, wherein the second request message further includes first indication information, the first indication information being used to indicate that the terminal device has a subscription with a PLMN.
17. The terminal device of claim 15, wherein the second request response message includes a valid duration for the terminal device to access the first network.
18. The terminal device according to any of the claims 15 to 17, characterized in that the terminal device further comprises:
the communication unit is used for receiving second indication information sent by the core network equipment, wherein the second indication information is used for indicating a first service and/or a second service which are/is allowed to be accessed by the terminal equipment, the first service is the service of the first network accessed by the terminal equipment, and the second service is the service of the PLMN accessed by the terminal equipment through the first network.
19. The terminal device according to any of the claims 15 to 17, characterized in that the core network device is a core network device of the first network.
20. A core network device, comprising:
the communication unit is used for receiving a second request message sent by the terminal equipment, wherein the second request message comprises a first identifier of the terminal equipment accessed to a first network and an identifier of the terminal equipment, the first network is an unshared core network deployed by an operator, and the terminal equipment has subscription with a Public Land Mobile Network (PLMN);
the communication unit is further configured to send a second request response message to the terminal device, where the second request response message is used to indicate whether the terminal device is allowed to access the first network;
wherein, the core network device further includes:
the processing unit is used for determining whether the terminal equipment is allowed to access the first network according to the first identifier and the identifier of the terminal equipment;
the communication unit is specifically configured to:
sending a verification request message to first equipment, wherein the verification request message comprises a first terminal equipment identifier and the first identifier;
Receiving a check response message sent by the first device, wherein the check response message comprises a check result of whether the terminal device is allowed to access the first network;
the processing unit is specifically configured to:
based on the verification result, determining whether to allow the terminal device to access the first network,
the first device is an application server.
21. The core network device according to claim 20, wherein the check response message further comprises an effective duration of the terminal device accessing the first network and/or a first service allowed to be accessed by the terminal device, wherein the first service is a service of the first network accessed by the terminal device.
22. The core network device of claim 20, wherein the core network device further comprises:
and the processing unit is used for determining whether the terminal equipment has subscription with the PLMN.
23. The core network device according to claim 22, wherein the processing unit is specifically configured to:
and determining whether the terminal equipment has a subscription with the PLMN or not based on first indication information, wherein the first indication information is used for indicating that the terminal equipment has the subscription with the PLMN.
24. The core network device according to claim 23, wherein the first indication information is identification information of the terminal device.
25. The core network device according to any of claims 20 to 24, characterized in that the core network device further comprises:
the processing unit is used for calling a subscription request service to the Unified Data Management (UDM) of the PLMN, wherein the subscription request service is used for requesting subscription information of the terminal equipment;
the communication unit is further configured to:
and receiving a subscription request response service called by the UDM, wherein the subscription request response service comprises third indication information, the third indication information is used for indicating a second service which is allowed to be accessed by the terminal equipment, and the second service is a service of a PLMN which is accessed by the terminal equipment through the first network.
26. The core network device according to any of claims 20 to 24, wherein the communication unit is further configured to:
and sending second indication information to the terminal equipment, wherein the second indication information is used for indicating a first service and/or a second service which are/is allowed to be accessed by the terminal equipment, the first service is the service of the first network accessed by the terminal equipment, and the second service is the service of the PLMN accessed by the terminal equipment through the first network.
27. The core network device according to any of claims 20 to 24, wherein the second request response message comprises an effective duration for the terminal device to access the first network.
28. The core network device according to any of claims 20 to 24, characterized in that the core network device is a core network device of the first network.
29. A terminal device, comprising: a processor and a memory for storing a computer program, the processor being adapted to invoke and run the computer program stored in the memory, to perform the method according to any of claims 1 to 5.
30. A core network device, comprising: a processor and a memory for storing a computer program, the processor being for invoking and running the computer program stored in the memory, performing the method of any of claims 6 to 14.
31. A chip, comprising: a processor for calling and running a computer program from a memory, causing a device on which the chip is mounted to perform the method of any one of claims 1 to 5.
32. A chip, comprising: a processor for calling and running a computer program from a memory, causing a device on which the chip is mounted to perform the method of any of claims 6 to 14.
33. A computer readable storage medium storing a computer program for causing a computer to perform the method of any one of claims 1 to 5.
34. A computer readable storage medium storing a computer program for causing a computer to perform the method of any one of claims 6 to 14.
CN201880097268.8A 2018-10-31 2018-10-31 Communication method and device Active CN112655182B (en)

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/CN2018/112924 WO2020087327A1 (en) 2018-10-31 2018-10-31 Communication method and device

Publications (2)

Publication Number Publication Date
CN112655182A CN112655182A (en) 2021-04-13
CN112655182B true CN112655182B (en) 2023-09-15

Family

ID=70461930

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201880097268.8A Active CN112655182B (en) 2018-10-31 2018-10-31 Communication method and device

Country Status (2)

Country Link
CN (1) CN112655182B (en)
WO (1) WO2020087327A1 (en)

Families Citing this family (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2023539994A (en) * 2020-07-31 2023-09-21 オッポ広東移動通信有限公司 Device access authentication method, terminal device and cloud platform
CN113676996A (en) * 2021-08-11 2021-11-19 成都中科微信息技术研究院有限公司 Satellite terminal registration method, system and terminal based on DVB and 5G fusion networking
CN114268949A (en) * 2021-11-16 2022-04-01 浙江大学 Network building method of 5G local area network
CN116456353A (en) * 2022-01-06 2023-07-18 维沃移动通信有限公司 Managed network access processing method and device, terminal and network side equipment
CN116528349A (en) * 2022-01-24 2023-08-01 华为技术有限公司 Method and device for acquiring subscription information

Citations (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1893426A (en) * 2005-07-08 2007-01-10 中国电信股份有限公司 Method and system for realizing pass-through of fier-wall at personal network video signals
CN101299870A (en) * 2007-04-30 2008-11-05 华为技术有限公司 Control method, system and apparatus for accessing private base station
CN104980993A (en) * 2015-06-19 2015-10-14 广东欧珀移动通信有限公司 Network access method, mobile communication terminal, network server and network access system
WO2016193783A1 (en) * 2015-05-29 2016-12-08 Nokia Technologies Oy Method and apparatus for implementing network-controlled peer-to-peer connectivity
WO2017034195A1 (en) * 2015-08-26 2017-03-02 엘지전자 주식회사 Method for obtaining operator network identification number of visited network
WO2017067337A1 (en) * 2015-10-23 2017-04-27 中兴通讯股份有限公司 Method and apparatus for controlling monitoring service of proximity-based service
WO2017082532A1 (en) * 2015-11-09 2017-05-18 엘지전자 주식회사 Method for acquiring business operator network identification number of visited network
CN107534929A (en) * 2015-09-18 2018-01-02 华为技术有限公司 Core network selection method, apparatus and system
CN107623909A (en) * 2017-09-30 2018-01-23 广东欧珀移动通信有限公司 Configuration information acquisition, processing method, device and system
CN108605282A (en) * 2016-02-10 2018-09-28 高通股份有限公司 Technology for providing network insertion
CN108632815A (en) * 2017-03-24 2018-10-09 华为技术有限公司 Communication means and equipment

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101009740B (en) * 2007-01-17 2012-05-30 广州市高科通信技术股份有限公司 System and method for implementing simultaneous data and voice access of the dual PPPOE
GB2472842B (en) * 2009-08-21 2012-06-27 Samsung Electronics Co Ltd A network entity, a wireless communication unit and methods for access to a remote private IP network and supporting therof
CN102209124B (en) * 2011-06-08 2014-03-12 杭州华三通信技术有限公司 Method for communication between private network and public network and network address translation equipment
CN103166864B (en) * 2013-03-26 2016-01-20 杭州华三通信技术有限公司 A kind of private network vlan information management method and equipment

Patent Citations (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1893426A (en) * 2005-07-08 2007-01-10 中国电信股份有限公司 Method and system for realizing pass-through of fier-wall at personal network video signals
CN101299870A (en) * 2007-04-30 2008-11-05 华为技术有限公司 Control method, system and apparatus for accessing private base station
WO2016193783A1 (en) * 2015-05-29 2016-12-08 Nokia Technologies Oy Method and apparatus for implementing network-controlled peer-to-peer connectivity
CN104980993A (en) * 2015-06-19 2015-10-14 广东欧珀移动通信有限公司 Network access method, mobile communication terminal, network server and network access system
WO2017034195A1 (en) * 2015-08-26 2017-03-02 엘지전자 주식회사 Method for obtaining operator network identification number of visited network
CN107534929A (en) * 2015-09-18 2018-01-02 华为技术有限公司 Core network selection method, apparatus and system
WO2017067337A1 (en) * 2015-10-23 2017-04-27 中兴通讯股份有限公司 Method and apparatus for controlling monitoring service of proximity-based service
WO2017082532A1 (en) * 2015-11-09 2017-05-18 엘지전자 주식회사 Method for acquiring business operator network identification number of visited network
CN108605282A (en) * 2016-02-10 2018-09-28 高通股份有限公司 Technology for providing network insertion
CN108632815A (en) * 2017-03-24 2018-10-09 华为技术有限公司 Communication means and equipment
CN107623909A (en) * 2017-09-30 2018-01-23 广东欧珀移动通信有限公司 Configuration information acquisition, processing method, device and system

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
Nokia, Nokia Shanghai Bell.S2-188992 "Access Control for 5G Vertical and LAN Services".3GPP tsg_sa\wg2_arch.2018,(tsgs2_128bis_sophia_antipolis),第1-3页. *
Solution for supporting Non-standalone NPN;Interdigital Inc;《3GPP tsg_sa\wg2_arch》;20181019;第3-4页 *

Also Published As

Publication number Publication date
CN112655182A (en) 2021-04-13
WO2020087327A1 (en) 2020-05-07

Similar Documents

Publication Publication Date Title
CN112655182B (en) Communication method and device
CN111787590B (en) Session management method, terminal device and network device
CN113316148B (en) Method and apparatus for network slice authentication
CN112673687B (en) Registration method, terminal equipment and network equipment
CN112219379B (en) Network access method, terminal equipment and network equipment
CN111972005B (en) Method and device for establishing transmission path
CN114342549A (en) Method and apparatus for connecting network
CN113692777B (en) Redirection method and device, terminal equipment and network equipment
CN112655244B (en) Service processing method, device and storage medium
CN112929949B (en) Wireless communication method and communication device
CN113316151B (en) Communication method, device and equipment
JP2022515590A (en) Network access method and device
CN111757551B (en) Communication method in Internet of vehicles, terminal equipment and network equipment
CN114303421A (en) Wireless communication method, terminal equipment and network equipment
CN113015230B (en) Wireless communication method and terminal device
CN112956241B (en) Service request method, electronic equipment and storage medium
CN111869266A (en) Core network selection method and device, terminal equipment and network equipment
CN112205060B (en) Wireless communication method, access network device, terminal device and core network device
CN113366888B (en) Wireless communication method, network device and terminal device
CN113329396B (en) Data transmission method and network equipment
CN112385271A (en) Network information transmission method, network information acquisition method, network equipment and terminal equipment
CN111787621B (en) Bearer configuration method and device and network equipment
CN115037705B (en) Communication method and device
CN117978560A (en) Network equipment selection method and related equipment
CN117377065A (en) Wireless communication method, device and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant