CN109151950A - A kind of method, the network equipment and the terminal device of access control - Google Patents

A kind of method, the network equipment and the terminal device of access control Download PDF

Info

Publication number
CN109151950A
CN109151950A CN201710459461.9A CN201710459461A CN109151950A CN 109151950 A CN109151950 A CN 109151950A CN 201710459461 A CN201710459461 A CN 201710459461A CN 109151950 A CN109151950 A CN 109151950A
Authority
CN
China
Prior art keywords
network
information
ran
network slice
mapping ruler
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201710459461.9A
Other languages
Chinese (zh)
Other versions
CN109151950B (en
Inventor
娄崇
毕皓
韩锋
晋英豪
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Huawei Technologies Co Ltd
Original Assignee
Huawei Technologies Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Huawei Technologies Co Ltd filed Critical Huawei Technologies Co Ltd
Priority to CN201710459461.9A priority Critical patent/CN109151950B/en
Priority to PCT/CN2018/091436 priority patent/WO2018228517A1/en
Publication of CN109151950A publication Critical patent/CN109151950A/en
Application granted granted Critical
Publication of CN109151950B publication Critical patent/CN109151950B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W48/00Access restriction; Network selection; Access point selection
    • H04W48/02Access restriction performed under specific conditions
    • H04W48/04Access restriction performed under specific conditions based on user or terminal location or mobility data, e.g. moving direction, speed
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W48/00Access restriction; Network selection; Access point selection
    • H04W48/02Access restriction performed under specific conditions
    • H04W48/06Access restriction performed under specific conditions based on traffic conditions
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W48/00Access restriction; Network selection; Access point selection
    • H04W48/08Access restriction or access information delivery, e.g. discovery data delivery
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W48/00Access restriction; Network selection; Access point selection
    • H04W48/18Selecting a network or a communication service

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The embodiment of the present application discloses a kind of method of access control, and the complexity of access control is sliced for reducing network.Application embodiment method includes: first network equipment to terminal device transmission first message, and the first message includes the first mapping ruler, and first mapping ruler includes the information of at least one wireless access network network slice;The first network equipment sends access control information to the terminal device.The embodiment of the present application also provides a kind of network equipment and terminal device.

Description

A kind of method, the network equipment and the terminal device of access control
Technical field
This application involves the communications field more particularly to a kind of method, the network equipment and the terminal devices of access control.
Background technique
In order to cope with the various user's use-case that is occurring or will occur, different user's use-cases is to network performance There are significant difference, the 5th Generation Mobile Communication System (the fifth generation, 5G), such as (new that newly eats dishes without rice or wine for demand Radio, NR) notable feature be to propose the network architecture of network slice (network slice, NS).Software defined network Network (software defined network, SDN) and network function virtualize (network function Virtualization, NFV) technology be network slice framework core technology, bottom physical resource may be implemented in NFV technology Virtualization, loads virtual network function (network function, NF) to general-purpose platform, such as virtual machine, and SDN technology is then real Logical connection between existing virtual machine, constructs the access of carrier signaling and data flow.By accessing net (radio access Network, RAN) and the NF of core net (core network, CN) between Dynamic link library, configuration business chain end to end, from And construct network slice.Operator can be according to each specific business use-case to capacity, covering, rate, time delay and reliability The demand of equal Key Performance Indicators (key performance indicator, KPI), forms a particular network functions set And comprising Internet resources needed for running these network functions, so as to provide required telecommunications service business and network energy Power service meets specialized market's scene and demand.
As shown in Figure 1, supporting the schematic diagram of multiple network slices for 3GPP.Third generation partner program (the third Generation partnership project, 3GPP) main Types that the network of 5G is sliced have been divided into following three categories: Mobile broadband service (enhanced mobile broadband, eMBB), the magnanimity machine type of enhancing connect business (massive machine type communication, mMTC) and super reliable low time delay business (ultra-reliable And low latency communications, URLLC).Wherein eMBB be mainly directed towards to rate and mobility have it is higher The terminal of demand, such as mobile phone, multimedia equipment, mMTC mainly for internet of things equipment, have extensive, Hypomobility and Lower rate requirement.URLLC then refer mainly to car networking, security information etc. to time delay and reliability have rigors business and Device type.For example, mobile phone user can access the network slice of eMBB type, high-speed downloads or viewing 4K high definition view are carried out Frequently, sensor device can access mMTC network slice and carry out the transmission of small data packets and the update of system configuration.User sets It is standby to access one or more or overall network slice simultaneously, meet business demand and reaches preferable user experience.
It, can be by access control come restricting user equipment (user if congestion condition occurs in current network Equipment, UE) access connection or service request reach and alleviate network congestion to carry out the management of network load Purpose, long term evolution (Long Term Evolution, LTE) system use access restriction inspection (Access Barring Check, ABC) mode.The scheme for being currently accessed control is bigger etc. in the presence of access control complexity, poor compatibility, overhead Problem.
Summary of the invention
The embodiment of the present application provides method, the network equipment and the terminal device of a kind of access control, for reducing net The complexity of network slice access control.
Wireless communication system applied by the embodiment of the present application may include first network equipment, terminal device and the second net Network equipment, terminal device are illustrated by taking CN as an example by UE, first network equipment by RAN, second network equipment.I.e. this is wireless Communication system may include access net (Radio Access Network, RAN) equipment, core net (Core Network, CN) Equipment and user equipment (User Equipment, UE).The communication system of the embodiment of the present application supports network to be sliced framework, this is logical Core net network slice in letter system can share core web network equipment and/or core net Internet resources, can also monopolize Core web network equipment and/or core net Internet resources.In the wireless communication system, UE by RAN equipment access one or Multiple RAN network slices or CN network slice.Specifically, the information that RAN equipment is provided according to UE, and configure or obtain Access and mobile management function to ps domain (Access and Mobility Management Function, AMF) information are selected for UE Select AMF.
The embodiment of the present application first aspect provides a kind of method of access control, may include: first network equipment to end End equipment sends first message, and the first message includes the first mapping ruler, and first mapping ruler includes at least one The information of wireless access network RAN network slice;The first network equipment sends access control information to the terminal device.? In the embodiment of the present application, because RAN network slice is usually one-to-many mapping relations with core net CN network slice, What RAN included into the first mapping ruler that UE is sent be at least one RAN network slice information, compared with the existing technology and It says, the configuration content of the first mapping ruler is smaller in the embodiment of the present application, and complexity is relatively low.
In conjunction with the embodiment of the present application in a first aspect, in the first implementation of the embodiment of the present application first aspect, First mapping ruler and access control information are for carrying out access control to the terminal device.Implement in the application In example, the first mapping ruler and access control information that RAN is sent to UE can be used for UE and carry out access control, initiate network The access of slice.And include in the first mapping ruler be at least one RAN network slice information because RAN network be sliced Information of the information generally with CN network slice be one-to-many relationship, so, the configuration content of the second mapping ruler is less than existing Some configuration contents, complexity are lower.
In conjunction with the embodiment of the present application in a first aspect, the first implementation of first aspect, in the embodiment of the present application In second of implementation of one side, the method can also include: that the first network equipment is received from the second net The second message of network equipment, the second message include the second mapping ruler, and second mapping ruler includes at least one CN Access category, first mapping ruler further include the information and at least one described CN that at least one described RAN network is sliced The mapping relations of access category.In the embodiment of the present application, at least one CN access category can be understood as searching mapping ruler In include at least one factor (such as the access grade of UE, the information of at least one CN network slice, application, class of service Deng) it is corresponding access control information index.The information of at least one RAN network slice is true according at least one access category Fixed, because RAN preserves the mapping relations of the information of preset RAN network slice and the information of CN network slice.RAN can be with The information of at least one CN network slice, at least one CN network slice are determined according to the information that currently available CN network is sliced Information it is corresponding at least one CN classification, so, the second mapping ruler may include at least one RAN network slice information With the mapping relations of at least one CN access category.A kind of optional implementation of second mapping ruler is provided, it is described First mapping ruler can also include the information and at least one CN access category that at least one described RAN network is sliced Mapping relations increase the flexibility of application scheme.
In conjunction with the embodiment of the present application in a first aspect, the first implementation of first aspect, in the embodiment of the present application In the third implementation of one side, the method can also include: that the first network equipment is received from the second net The third message of network equipment, the third message include the network slice selection auxiliary information Allowed that CN network allows NSSAI list, first mapping ruler further include the information and the CN Allowed that at least one described RAN network is sliced The mapping relations of NSSAI list.In the embodiment of the present application, the information of at least one CN network slice is according to CN Allowed What NSSAI list determined, RAN preserves the mapping relations of the information of preset RAN network slice and the information of CN network slice, So can determine the information of at least one RAN network slice according to the information that at least one CN network is sliced.Provide one kind The optional implementation of second mapping ruler, the first mapping ruler can also include the letter of at least one RAN network slice The mapping relations of breath and the CN Allowed NSSAI list, increase the flexibility of application scheme.
In conjunction with the embodiment of the present application in a first aspect, the first implementation of first aspect, in the embodiment of the present application In 4th kind of implementation of one side, the method can also include: that the first network equipment is received from the second net 4th message of network equipment, the 4th message include the network slice selection auxiliary letter that the second mapping ruler and CN network allow Allowed NSSAI list is ceased, second mapping ruler includes at least one CN access category, and first mapping ruler is also Information, at least one described CN access category and the CN Allowed including at least one described RAN network slice The mapping relations of NSSAI list.In the embodiment of the present application, the information of at least one CN network slice is according to CN Allowed What NSSAI list determined, RAN preserves the mapping relations of the information of preset RAN network slice and the information of CN network slice, So the information of at least one RAN network slice can be determined according to the information that at least one CN network is sliced, and at least one CN access category is again corresponding with CN Allowed NSSAI list.A kind of optional implementation of second mapping ruler is provided, First mapping ruler can also include the information of at least one RAN network slice, the CN Allowed NSSAI list With the mapping relations of at least one CN access category, the flexibility of application scheme is increased.
Wherein, the network that CN can allow according to the CN that UE is reported is sliced the label of selection auxiliary information (CN NSSAI), UE The about factors selection such as information, availability of local policy, network slice agrees to that UE allows to access at least in current Acceditation Area The information of the information of one CN network slice, at least one CN network slice can be presented in the form of a list, can be described as CN NSSAI (CN Allowed NSSAI) list of permission, can also indicate, specifically without limitation in other manners.
In conjunction with the embodiment of the present application in a first aspect, the first of first aspect to second of any implementation, at this In the 5th kind of implementation for applying for embodiment first aspect, first mapping ruler further includes at least one described RAN net The mapping relations for the information that the information of network slice and currently available CN network are sliced.In the embodiment of the present application, at least one The information of CN network slice is that RAN is determined according to the information that currently available CN network is sliced, and provides another kind second and reflects The optional implementation of rule is penetrated, the flexibility of application scheme is increased.
In conjunction with the 4th kind of implementation of the first aspect of the embodiment of the present application, the of the embodiment of the present application first aspect In five kinds of implementations, first mapping ruler further includes the information, currently available of at least one RAN network slice The information of CN network slice and the mapping relations of at least one CN access category.In the embodiment of the present application, at least one CN net The information of network slice is that RAN is determined according to the information that currently available CN network is sliced, and provides another kind the second mapping rule Then optional implementation increases the flexibility of application scheme.
In conjunction with the embodiment of the present application in a first aspect, the first of first aspect to the 5th kind of any implementation, at this In the 6th kind of implementation for applying for embodiment first aspect, first mapping ruler further includes at least one described RAN net The information of network slice and the mapping relations of at least one RAN access category.In the embodiment of the present application, at least one RAN is accessed Classification is the access category that RAN is reconfigured, it can be understood as search the second mapping ruler in include at least one because The index of the corresponding access control information of element (information etc. of for example, at least RAN network slice).Provide another kind second The optional implementation of mapping ruler, increases the flexibility of application scheme.
In conjunction with the embodiment of the present application in a first aspect, the first of first aspect to the 6th kind of any implementation, at this In the 7th kind of implementation for applying for embodiment first aspect, first mapping ruler further includes at least one described RAN net Information, the mapping relations of CN Allowed NSSAI list and RAN access category of network slice.In the embodiment of the present application, until The information of few CN network slice is that RAN is determined according to CN Allowed NSSAI list, provides another kind second and reflects The optional implementation of rule is penetrated, the flexibility of application scheme is increased.
In conjunction with the embodiment of the present application in a first aspect, the first of first aspect to the 7th kind of any implementation, at this In the 8th kind of implementation for applying for embodiment first aspect, first mapping ruler further includes at least one described RAN net The mapping relations of the information of network slice, the information of currently available CN network slice and RAN access category.In the embodiment of the present application In, the information of at least one CN network slice is that RAN is determined according to the information that currently available CN network is sliced, and is provided another A kind of optional implementation of second mapping ruler, increases the flexibility of application scheme.
It should be noted that it is above-mentioned the first into the 8th kind of any possible implementation, the second mapping ruler packet The information of at least one the RAN network slice included can be at least one RAN access category, alternatively, CN Allowed NSSAI List, alternatively, CN Allowed NSSAI list is at least one RAN access category, there are mapping relations, alternatively, currently available CN network slice information, alternatively, at least one CN access category.But it can also not include in the second mapping ruler At least one RAN access category, alternatively, CN Allowed NSSAI list, alternatively, CN Allowed NSSAI list and at least One RAN access category, alternatively, the information that currently available CN network is sliced, alternatively, at least one CN access category, RAN is only Need to know that they have mapping relations just, specifically without limitation.
The embodiment of the present application second aspect provides a kind of method of access control, may include: that terminal device reception comes from In the first message of first network equipment, the first message includes the first mapping ruler, and first mapping ruler includes extremely The information of few wireless access network RAN network slice;The terminal device receives connecing from the first network equipment Enter to control information.In the embodiment of the present application, because the information of RAN network slice and the information of CN network slice are usually a pair More mapping relations, so, what RAN included into the first mapping ruler that UE is sent is the letter of at least one RAN network slice Breath, in terms of existing technologies, the configuration content of the first mapping ruler is smaller in the embodiment of the present application, and complexity compares It is low.
In conjunction with the second aspect of the embodiment of the present application, in the first implementation of the embodiment of the present application second aspect, The method also includes: the terminal device carries out access control according to first mapping ruler and access control information System.In the embodiment of the present application, UE can carry out access control inspection according to the information that at least one RAN network is sliced, because Information of the information of RAN network slice generally with CN network slice is one-to-many relationship, so, the configuration of the second mapping ruler Content is less than existing configuration content, and complexity is lower.Also achieve the control of RAN network slice granularity.UE is also solved to ask The inconsistent situation of the information of the CN network slice of the information and CN distribution for the CN network slice asked, because identical services type The information MAP of different CN network slices is identical in the information majority of case that the RAN network of RAN is sliced.
In conjunction with the second aspect of the embodiment of the present application, the first implementation of second aspect, in the embodiment of the present application In second of implementation of two aspects, first mapping ruler further includes the information of at least one RAN network slice With the mapping relations of at least one RAN access category.In the embodiment of the present application, UE can be cut according at least one RAN network The information of piece or at least one RAN access category carry out access control and check, improve the washability of technical scheme And flexibility, because information of the information of RAN network slice generally with CN network slice is one-to-many relationship, second The configuration content of mapping ruler is less than existing configuration content, and complexity is lower.Also achieve the control of RAN network slice granularity System.The inconsistent situation of the information that the CN network of the information and CN distribution that also solve the CN network slice of UE request is sliced, because It is in the information majority of case that the RAN network of RAN is sliced for the information MAP that the different CN networks of identical services type are sliced It is identical.
In conjunction with the second aspect of the embodiment of the present application, the first implementation of second aspect, in the embodiment of the present application In the third implementation of two aspects, first mapping ruler further includes the information of at least one RAN network slice With the mapping relations of at least one CN access category.In the embodiment of the present application, UE can be sliced according at least one RAN network Information or at least one CN access category carry out access control check, improve the washability and spirit of technical scheme Activity, because information of the information of RAN network slice generally with CN network slice is one-to-many relationship, the second mapping The configuration content of rule is less than existing configuration content, and complexity is lower.Also achieve the control of RAN network slice granularity.Also The inconsistent situation of the information that the CN network of the information and CN distribution that solve the CN network slice of UE request is sliced, because identical The information MAP of the different CN networks slice of type of service is identical in the information majority of case that the RAN network of RAN is sliced.
In conjunction with the second aspect of the embodiment of the present application, the first implementation of second aspect, in the embodiment of the present application In 4th kind of implementation of two aspects, first mapping ruler further includes the information of at least one RAN network slice With the mapping relations of the information of at least one CN network slice.In the embodiment of the present application, UE can be according at least one RAN net The information of network slice or the information of at least one CN network slice carry out access control and check, improve technical scheme Washability and flexibility because RAN network slice information generally with CN network slice information be one-to-many relationship, institute With the configuration content of the second mapping ruler is less than existing configuration content, and complexity is lower.Also achieve RAN network slice grain The control of degree.The inconsistent feelings of the information that the CN network of the information and CN distribution that also solve the CN network slice of UE request is sliced Condition, because of the most of feelings of information that the information MAP that the different CN networks of identical services type are sliced is sliced in the RAN network of RAN Condition is identical.
In conjunction with the second aspect of the embodiment of the present application, the first implementation of second aspect, in the embodiment of the present application In 5th kind of implementation of two aspects, first mapping ruler further include at least one RAN network slice information, The information of at least one CN network slice and the mapping relations of at least one RAN access category.In the embodiment of the present application, In, at least one network CN slice information is that RAN can be according to CN Allowed NSSAI list or currently available CN net Network slice determination.The information that UE can be sliced according at least one RAN network, alternatively, can be accessed according at least one RAN The access that classification carries out RAN network slice, which controls, to be checked, alternatively, can carry out RAN network according at least one CN access category The access of slice, which controls, to be checked.Because information of the information of RAN network slice generally with CN network slice is one-to-many relationship, The control of RAN network slice granularity is also achieved, solves the information of the CN network slice of UE request and the CN network of CN distribution The inconsistent situation of the information of slice, because the information MAP that is sliced of the different CN networks of identical services type is in the RAN net of RAN The information majority of case of network slice is identical.
In conjunction with the second aspect of the embodiment of the present application, the first implementation of second aspect, in the embodiment of the present application In 6th kind of implementation of two aspects, first mapping ruler further include at least one RAN network slice information, The information of at least one CN network slice and the mapping relations of at least one CN access category.In the embodiment of the present application, UE can It is checked with the access control that the information being sliced according at least one RAN network carries out RAN network slice, alternatively, can be according to extremely The access that the information of few CN network slice carries out CN network slice, which controls, to be checked, the optional of technical scheme is improved Property and flexibility.The control of RAN network slice granularity is also achieved, the information and CN for solving the CN network slice of UE request are divided The inconsistent situation of the information for the CN network slice matched, because the information MAP that the different CN networks of identical services type are sliced exists The information majority of case of the RAN network slice of RAN is identical.
The embodiment of the present application third aspect provides a kind of method of access control, may include: second network equipment to the One network equipment sends second message, and the second message includes the second mapping ruler, and second mapping ruler includes at least One CN access category.In the embodiment of the present application, include at least one CN access category in the second mapping ruler, can be used for It is identified by RAN, according to the mapping relations of the information of preset RAN network slice and the information of CN network slice, determines at least The information of one CN network slice, provides a kind of achievable mode.
In conjunction with the third aspect of the embodiment of the present application, in the first possible realization side of the embodiment of the present application third aspect In formula, the second message includes the slice selection auxiliary information Allowed NSSAI list of CN network.In the embodiment of the present application In, if second message includes the slice selection auxiliary information Allowed NSSAI list of CN network, then, RAN can direct basis CN Allowed NSSAI list determines the information of at least one CN network slice, thus, it determines in the second mapping ruler extremely The information of few RAN network slice, provides a kind of achievable mode.
In conjunction with the first possible implementation of the embodiment of the present application third aspect, in the embodiment of the present application third aspect Second of possible implementation in, second mapping ruler includes at least one described CN access category and the CN The mapping relations of Allowed NSSAI list.
The embodiment of the present application fourth aspect provides a kind of network equipment, has the complexity for reducing network slice access control Function.The function can also execute corresponding software realization by hardware realization by hardware.The hardware or software package Include one or more modules corresponding with above-mentioned function.
The 5th aspect of the embodiment of the present application provides a kind of terminal device, has the complexity for reducing network slice access control Function.The function can also execute corresponding software realization by hardware realization by hardware.The hardware or software package Include one or more modules corresponding with above-mentioned function.
The 6th aspect of the embodiment of the present application provides a kind of network equipment, has the complexity for reducing network slice access control Function.The function can also execute corresponding software realization by hardware realization by hardware.The hardware or software package Include one or more modules corresponding with above-mentioned function.
The 7th aspect of the embodiment of the present application provides a kind of network equipment, may include:
Memory, transceiver, the memory and the transceiver are connected by bus;
The memory, for storing operational order;
The transceiver, for sending first message to terminal device, described first disappears by calling the operational order Breath includes the first mapping ruler, and first mapping ruler includes the information of at least one RAN network slice;It is set to the terminal Preparation send access control information.
The embodiment of the present application eighth aspect provides a kind of wireless communication device, may include:
At least one processor, memory, transmission circuit and bus system, the processor, the memory, the receipts Power Generation Road is coupled by the bus system, and the wireless communication device is communicated by the transmission circuit with terminal device, The memory is for storing program instruction, at least one described processor is for executing the journey stored in the memory Sequence instruction, so that the wireless communication device executes first described in the method as described in the embodiment of the present application first aspect is any The part of network device operation.The wireless communication device is also possible to apply in network side equipment either the network equipment The middle System on Chip/SoC for executing corresponding function.
The 9th aspect of the embodiment of the present application provides a kind of wireless communication device, may include:
At least one processor, memory, transmission circuit and bus system, the processor, the memory, the receipts Power Generation Road is coupled by the bus system, and the wireless communication device is communicated by the transmission circuit with network side equipment Letter, the memory is for storing program instruction, at least one described processor is for executing the institute stored in the memory Program instruction is stated, so that the wireless communication device executes described in the method as described in the embodiment of the present application second aspect is any The part of terminal device operation.The wireless communication device is also possible to apply in terminal device either terminal device Execute the System on Chip/SoC of corresponding function.
The tenth aspect of the embodiment of the present application provides a kind of communication system, which includes first network equipment, terminal Equipment and second network equipment, the first network equipment are to execute the application first aspect or any optional realization side of first aspect The first network equipment being somebody's turn to do in formula;The terminal device is to execute the application second aspect or any optional implementation of second aspect In the terminal device that is somebody's turn to do;Second network equipment is to execute in the application third aspect or any optional implementation of the third aspect This second network equipment.
The tenth one side of the embodiment of the present application provides a kind of storage medium, it should be noted that the technical solution sheet of this hair The all or part of the part that contributes to existing technology or the technical solution can produce mouth with software in other words in matter Form embodies, which is stored in a storage medium, by being stored as based on used in above equipment Calculation machine software instruction, it includes be first network equipment, terminal for executing above-mentioned first aspect, second aspect or the third aspect Program designed by equipment or second network equipment.
The storage medium includes: USB flash disk, mobile hard disk, read-only memory (ROM, Read-Only Memory), arbitrary access The various media that can store program code such as memory (RAM, Random Access Memory), magnetic or disk.
The aspect of the embodiment of the present application the 12nd provides a kind of computer program product comprising instruction, when its on computers When operation, so that computer executes the method as described in the application first aspect or first aspect any optional implementation.
The aspect of the embodiment of the present application the 13rd provides a kind of computer program product comprising instruction, when its on computers When operation, so that computer executes the method as described in the application second aspect or second aspect any optional implementation.
The embodiment of the present application fourteenth aspect provides a kind of computer program product comprising instruction, when its on computers When operation, so that computer executes the method as described in the application third aspect or the third aspect any optional implementation.
As can be seen from the above technical solutions, the embodiment of the present application has the advantage that
The embodiment of the present application sends first message to terminal device by first network equipment, and the first message includes the One mapping ruler, first mapping ruler include the information of at least one RAN network slice;The first network equipment is to institute It states terminal device and sends access control information.Because the information of RAN network slice and the information of CN network slice are usually a pair More mapping relations, so, what RAN included into the first mapping ruler that UE is sent is the letter of at least one RAN network slice Breath, in terms of existing technologies, the configuration content of the first mapping ruler is smaller in the embodiment of the present application, and complexity compares It is low.
Detailed description of the invention
Technical solution in ord to more clearly illustrate embodiments of the present application, below will be to institute in embodiment and description of the prior art Attached drawing to be used is needed to be briefly described, it should be apparent that, the accompanying drawings in the following description is only some implementations of the application Example, can also be obtained according to these attached drawings other attached drawings.
Fig. 1 is the schematic diagram that 3GPP supports multiple network slices in the embodiment of the present application;
Fig. 2A is a schematic diagram of a scenario applied in the embodiment of the present application;
Fig. 2 B is a configuration diagram of wireless communication system applied in the embodiment of the present application;
Fig. 3 is one embodiment schematic diagram that the method for control is accessed in the embodiment of the present application;
Fig. 4 is another embodiment schematic diagram that the method for control is accessed in the embodiment of the present application;
Fig. 5 A is one embodiment schematic diagram of the network equipment in the embodiment of the present application;
Fig. 5 B is another embodiment schematic diagram of the network equipment in the embodiment of the present application;
Fig. 6 A is one embodiment schematic diagram of terminal device in the embodiment of the present application;
Fig. 6 B is another embodiment schematic diagram of terminal device in the embodiment of the present application;
Fig. 7 is another embodiment schematic diagram of the network equipment in the embodiment of the present application;
Fig. 8 is another embodiment schematic diagram of terminal device in the embodiment of the present application.
Specific embodiment
The embodiment of the present application provides method, the network equipment and the terminal device of a kind of access control, for reducing net The complexity of network slice access control.
In order to make those skilled in the art more fully understand application scheme, below in conjunction in the embodiment of the present application Attached drawing, technical solutions in the embodiments of the present application are described, it is clear that described embodiment is only the application a part Embodiment, instead of all the embodiments.Based on the embodiment in the application, it shall fall within the protection scope of the present application.
The invention relates to wireless access network equipment, terminal device and equipment of the core network.
Wherein, access network equipment is also referred to as base station, is that one kind is deployed in wireless access network to mention for terminal device For the device of wireless communication function, including but not limited to: various forms of macro base stations, micro-base station (also referred to as small station), relay station, It transmits and receives point (Transmission Reception Point, TRP), evolved node B (evolved Node B, eNB), Radio network controller (radio network controller, RNC), node B (Node B, NB), base station controller (Base Station Controller, BSC), base transceiver station (Base Transceiver Station, BTS), Home eNodeB (example Such as, Home evolved NodeB or Home Node B, HNB) and processing communication data Base Band Unit (BaseBand Unit, BBU) etc..In the system using different wireless access technologys, has the wireless access of similar wireless communication function The title of net equipment may be different.Only describe for convenience, it is above-mentioned to be provided for terminal device in all embodiments of the application The device of wireless communication function is referred to as wireless access network equipment.
Wherein, terminal device is also referred to as user equipment (user equipment, UE) or is moved in wireless communication standard Dynamic platform (mobile station, MS) etc., involved terminal device is a kind of with wireless receiving and dispatching in the embodiment of the present application The equipment of function, can be deployed in land, including indoor or outdoors, hand-held or vehicle-mounted;It can also be deployed on the water surface (as taken turns Ship etc.);It can also dispose in the sky (such as on aircraft, balloon and satellite etc.).The terminal device may include various types Mobile phone (mobile phone), tablet computer (Pad), the computer with radio transmission-receiving function, wireless data card, virtual reality (Virtual Reality, VR) terminal device, augmented reality (Augmented Reality, AR) terminal device, machine type The terminal device for communicating (machine type communication, MTC), in Industry Control (industrial control) Terminal device, the terminal device in unmanned (self driving), the end in tele-medicine (remote medical) End equipment, the terminal device in smart grid (smart grid), the end in transportation safety (transportation safety) End equipment, the terminal device in smart city (smart city), smart home (with wireless communication function home equipment, Such as refrigerator, TV, washing machine or furniture) and wearable device (such as smartwatch, Intelligent bracelet, pedometer etc.) etc. Deng.The so-called terminal device of the application is also configured to fixed position, has channel radio similar with aforementioned terminals equipment The equipment of telecommunication function.In the system using different wireless access technologys, the terminal for having similar wireless communication function is set Standby title may be different, only for convenience of description, in the embodiment of the present application, the above-mentioned device with wireless communication function It is referred to as terminal device.
Wherein, equipment of the core network, can be has the function of access and mobility management network, session management network function (Session Management NF, SMF), user's torus network function, the equipment of authentication management network function, AMF.
The term "and/or" occurred in the present patent application, only a kind of incidence relation for describing affiliated partner, indicates There may be three kinds of relationships, for example, A and/or B, can indicate: individualism A, exist simultaneously A and B, individualism B these three Situation.In addition, character "/" in the application, typicallys represent the relationship that forward-backward correlation object is a kind of "or".
Be likely to occur in the present patent application to various messages/information/equipment/network element/systems/devices/movement/behaviour All kinds of objects such as work/process/concept have carried out tax name, but these specific titles do not constitute the restriction to related object, institute Assign title can with scene, the factors such as context or use habit and change, the understanding to the art-recognized meanings of related object, should lead Will from its embodied in the technical solution/function that executes and technical effect determine.
With continuing to bring out for diversified communication system traffic, demand of the different communication services to network performance is deposited In significant difference, 5G introduces the concept of network slice, to cope with different communication business to the difference of network performance demand.
One complete network slice is sliced including but not limited to RAN network slice and CN network, and the common end that constructs is arrived The network at end is sliced framework, and CN network slice passes through the NF of one group of customization, includes access and mobile management function to ps domain (Access and Mobility Management Function, AMF), conversation management functional (Session Management Function, SMF), user plane functions (User Plane Function, UPF) etc..RAN network slice passes through scheduling and one The first different protocol layer 1 (such as physical layer) of group, second protocol layer 2 (such as media access control layer, wireless chain control layer, number According to packet aggregation layer etc.) etc. configuration realize different RAN network slices.Here the reality of unlimited fixture body RAN network slice Existing form, can also be realized by atomization, modularization by way of software implementation, instantiation etc..
In general, CN network slice is according to differences such as tenant and types of service, number is more, and RAN network is sliced Since interface-free resources are limited etc., factors number is less, and CN network slice is the pass of many-one or multi-to-multi with RAN network slice System, extreme case can achieve one-to-one ratio.
3GPP is concentrated mainly on network slice selection about the discussion of the network architecture at present, and the purpose that network is sliced selection is Suitable network slice is selected for UE, and UE and specific network slice are associated, thus with network slice foundation pair The connection of the control plane CP (control plane, CP) and/or user face UP (user plane, UP) that answer.
A brief description is done to the access control being sliced based on network below, as follows:
Network slice can regard logically independent virtual network as, and different network slices needs to guarantee the demand of isolation, Therefore it when the overload of network slice, needs to avoid being sliced other networks and causes negative impact, therefore base The isolation of network slice can be effectively ensured in the access control of network slice, to meet operator and network slice client's label The demand of the business demand or service-level agreement (Service Level Agreement, SLA) of administration.
Access control specifically, can pass through the ratio of limitation UE access network, such as design access restriction parameter, packet The factor containing access, access backoff time (back-off) etc., limit the network insertion of UE in proportion, to reach access control Different access restriction parameters can also be arranged for different business in purpose, to realize the distinctive access control of business, also It can be according to the access of different user access level restriction certain users.
LTE system supports the technology of a variety of access controls at present, it is known to following several implementations:
1) common access restriction inspection (Access Barring Check, ABC), according to signaling, urgency traffic, data Etc. types carry out access control, can also be according to different public land mobile network (Public Land Mobile Network, PLMN) carry out access control;
2) access restriction (Extended Access Barring, EAB) is extended, common ABC is extended, thus Limit the access of the UE of low access priority;
3) it is used for the distinctive congestion control of business (the Application specific Congestion of data communication Control for Data Communication, ACDC), it can will apply and classify, according to different classes of (category) different access control parameters is set;
4) the distinctive access control (Service Specific Access Control, SSAC) of business, can be adapted for Multimedia telephony services (Multi Media Telephony), it is shared comprising voice, video call, messaging service, video image Deng.
In a kind of technology, the existing ABC scheme of LTE is sliced applied to network, i.e. RAN is by the CN network of network support It is sliced the classification as individual ABC, the applicable access control information of each CN network slice is broadcasted, is based on CN net to realize The access control of network slice;RAN broadcasts the applicable access of CN network slice and controls information, such as the access control of CN network slice 1 The access of information processed, CN network slice 2 controls information;The access of each CN network slice controls letter in UE read system message Breath saves corresponding access and controls information in conjunction with the CN network to be initiated the connection slice;UE carries out access control again and checks, from And it decides whether to initiate wireless heterogeneous networks (Radio Resource Control, RRC) connection request.
But above-mentioned technology only increases the classification of CN network slice on the basis of LTE is existing, since CN network is sliced Number is excessive, causes the technology overhead big, backwards compatibility is poor.
It attempts to propose a kind of unified access control mechanism (unified access in 5G system standard formulation process Barring), a common framework can be designed, to simplify the access control mechanism of 5G.
In the program, CN can configure the applicable access category of UE, this configuration includes a mapping ruler, such as comprising The access grade of UE, the information of CN network slice, application, class of service etc. are mapped to a specific access category (Access category), is properly termed as CN access category.Wherein, CN access category can be understood as searching in mapping ruler At least one factor (such as access grade of UE, information, application, the class of service of at least one CN network slice etc.) for including The index of corresponding access control information.Further, which can pass through Non-Access Stratum (non-access by CN Stratum, NAS) message is sent to UE, it is transmitted during registration or registration area update.The mapping ruler can be with The form of table is presented, as described in Table 1.
Table 1
UE can trigger network insertion, and further according to the configuration information of acquisition, which may include mapping ruler, certainly It is fixed specifically to access corresponding CN access category.RAN indicates the corresponding CN access control information of CN access category by system message, Access restriction ratio and limitation time or bit map can be used for example to indicate whether to need to limit UE access etc.. UE carries out access restriction inspection again, i.e., before initiation access attempts, UE uses determining CN access category first, judges whether energy Initiate access;If UE determines that this time access is not limited, and initiates access attempts.
The program is uniformly controlled by CN, but CN network slice numbers are too big, it is ensured that different EAB/ACDC and CN nets The various combination of network slice can be mapped to suitable access category, and it is excessive to will result in NAS grade configuration forms, answer Miscellaneous degree is higher;And the CN network slice of UE request may be different from the CN network slice that network distributes.Such as certain of UE request The CN network slice of one tenant is unavailable in current region, and CN distributes the identical CN net of another tenant that can be substituted Network slice or the identical CN network slice of type of service.The granularity of RAN access control is sliced different from CN network, causes RAN Access control flexibility based on network slice is poor.
It as shown in Figure 2 A, is a schematic diagram of a scenario applied by the embodiment of the present application.The embodiment of the present application is with LTE system For, UE is located in the coverage area of one or more cells (carrier wave) of macro base station or the offer of small base station, for the small of UE service Area can be one or more.When having multiple for the serving cell of UE, UE can polymerize (carrier according to carrier wave Aggregation, CA) or dual link (Dual connectivity, DC) or cooperative multipoint transmission (CoMP, coordinated Multiple point transmission) mode works, and wherein at least one cell provides more than one technology lattice of eating dishes without rice or wine Formula, such as more than one Transmission Time Interval (transmission time interval, TTI), more than one son carry Wave spacing width, the eat dishes without rice or wine format or transmission characteristic of more than one circulating prefix-length etc., while wireless money is provided for UE Source.The application be also applied for Universal Mobile Communication System (Universal Mobile Telecommunications System, UMTS) system, CDMA (Code Division Multiple Access, CDMA) system, WLAN (wireless local area network, WLAN) or future 5G (the fifth generation) wireless communication system Deng.
It as shown in Figure 2 B, is a configuration diagram of wireless communication system applied by the embodiment of the present application.It can wrap First network equipment, terminal device and second network equipment are included, terminal device is with UE, first network equipment with RAN, the second network Equipment is illustrated by taking CN as an example.I.e. the wireless communication system may include access net (Radio Access Network, RAN) equipment 110, core net (Core Network, CN) equipment 120 and user equipment (User Equipment, UE) 130.This Apply for that the communication system of embodiment supports network to be sliced framework, the core net network slice in the communication system can share core Web network equipment and/or core net Internet resources can also monopolize core web network equipment and/or core net Internet resources.Such as Shown in Fig. 2 B, in the wireless communication system, UE 130 by RAN equipment 110 access one or more RAN networks slice or CN network slice.Specifically, the information that RAN equipment 110 is provided according to UE 130, and configuration or the access and mobility that obtain Management function (Access and Mobility Management Function, AMF) information selects AMF for UE 130.
In the embodiment of the present application, first network equipment sends first message to terminal device, and the first message includes the One mapping ruler, first mapping ruler include the information of at least one RAN network slice;The first network equipment is to institute It states terminal device and sends access control information.Terminal device can with the first mapping ruler based on the received and access control information into Row access control checks.Because the information of RAN network slice and the information of CN network slice are usually one-to-many mapping relations, So RAN include into the first mapping ruler that UE is sent be at least one RAN network slice information, relative to existing For technology, the configuration content of the first mapping ruler is smaller in the embodiment of the present application, and complexity is relatively low.Solves CN net Network slice is more, and NAS level form is caused to configure excessive, the excessively high problem of complexity.Further, the first mapping ruler may be used also To include the information of at least one RAN network slice and the mapping relations of at least one RAN access category, alternatively, described First mapping ruler further includes the information of at least one RAN network slice and the mapping of at least one CN access category Relationship, alternatively, first mapping ruler can also include the information of at least one RAN network slice, at least one RAN The mapping relations of access category and at least one CN access category.The information and CN for solving the CN network slice of UE request are distributed CN network slice the inconsistent situation of information because the information or type of service of identical CN network slice are mapped in The information majority of case of the RAN network slice of RAN is identical.Also achieve access of the RAN based on RAN network slice granularity Control.
In following embodiments, terminal device by UE, first network equipment by RAN, second network equipment by taking CN as an example To be illustrated.
Technical scheme is described further by way of examples below, as shown in figure 3, real for the application Apply one embodiment schematic diagram for the method that control is accessed in example, comprising:
301, upstream message is sent to CN by UE.
In the embodiment of the present application, UE sends upstream message to CN by RAN.The upstream message can be registration request or Person's registration area updates Non-Access Stratums (Non-access stratum, the NAS) message such as request.That is UE by RAN to CN (such as CN can be access management function, access and mobile management function to ps domain etc.) registration management request is initiated, request UE and CN are infused Volume completes the functions such as identification, authentication or registration area update.
It should be understood that the NAS message can be the relevant any upstream message of registration management, it is not limited to above-mentioned registration and asks It asks or registration area updates the NAS messages such as request.In one possible implementation, which can carry at least The slice that one CN network allows selects auxiliary information (network slice selection assistance Information, NSSAI), it is the information for the CN network slice that UE selection is suitble to access for assisting CN.
302, CN obtains the first mapping ruler, and the first mapping ruler includes at least one CN access category.
In the embodiment of the present application, after CN receives upstream message, CN configures the applicable CN access category of UE, available First mapping ruler, the first mapping ruler include at least one CN access category.For example, the first mapping ruler may include UE's The factors such as information, application, the class of service of access grade, at least one CN network slice are mapped to a specific access category (Access category), is properly termed as CN access category here, and CN access category can be understood as searching the first mapping ruler In include at least one factor (such as the access grade of UE, the information of at least one CN network slice, application, class of service Deng) it is corresponding access control information index.Further, CN access category can be indicated with number, letter, byte etc., It is not specifically limited in the embodiment of the present application.
Optionally, the first mapping ruler can be presented in table form, and the first mapping ruler does not include at least one The information of CN network slice, as shown in table 2 below:
Table 2
It optionally, may include the information of at least one CN network slice in the first mapping ruler, as shown in table 3 below:
Table 3
It should be noted that table 2 and table 3 are an example of the first mapping ruler, the first mapping ruler includes at least One CN access category, other factors for including can be more than or less than shown in above-mentioned table 2 and table 3.
Optionally, if the first mapping ruler includes the information of at least one CN network slice, which is cut The network that the information of piece can be allowed by least one CN network is sliced selection auxiliary information (network slice Selection assistance information, NSSAI) it indicates, specifically, the network that the CN network allows is sliced Select auxiliary information including but not limited to following relevant information:
Network slice type: the mobile broadband service (enhanced Mobile Broadband, eMBB) of such as enhancing, Super reliable low time delay communicates (Ultra-Reliable Low lactecncy Communications, URLLC), magnanimity machine Class communicates the information of the instruction such as (Massive Machine Type Communication, mMTC) network slice type.Into one Step ground, the network slice type can refer to end to end network slice type, be sliced comprising RAN network slice type and CN network Type can also refer to RAN network slice type or CN network slice type.
Type of service: it is related to specific business, such as the instruction business such as video traffic, car networking business, voice service The information of feature or specific business.
Network slice distinguishes (differentiator): auxiliary network slice type, type of service, for further discriminating between The information of network slice can be used for distinguishing the network slice under the same network slice type or type of service.
Tenant (Tenant) information: being used to indicate creation or rents the customer information of network slice, such as Tencent, country Power grid etc..
Subscriber group information: being used to indicate according to certain feature, such as the rank grouping that is grouped user of user is believed Breath.
Network is sliced example information: being used to indicate the instance identification and characteristic information for network slice creation.For example, It is sliced example allocation one mark for network, is used to indicate network slice example, instance identification can also be sliced in network On the basis of map a new mark, be associated with network slice example, recipient can identify the tool of representative according to the mark Volume grid is sliced example.
Proprietary core net (Dedicated Core Network, DCN) mark: the mark is for uniquely indicating proprietary core Net, such as the core net that Internet of Things is proprietary.Optionally, DCN mark can be sliced mark and do and map with network, be identified by DCN Network slice mark can be mapped out, DCN mark can also be mapped out by network slice mark.
It should be noted that the method for determination of CN Allowed NSSAI list are as follows: CN can permit according to the CN that UE is reported Perhaps network slice selection auxiliary information (CN NSSAI), the signing information of UE, local policy, network slice availability etc. because The information at least one CN network slice that UE allows to access in current Acceditation Area, at least one CN network are agreed in element selection The information of slice can be presented in the form of a list, can be described as NSSAI (CN Allowed NSSAI) list of CN permission, can also To indicate in other manners, specifically without limitation.
303, the first downstream message is sent to RAN by CN.
In the embodiment of the present application, CN sends the first downstream message to RAN, and RAN reception disappears from the first downlink of CN Breath.First downstream message may include the first mapping ruler and CN Allowed NSSAI list, and the first mapping ruler includes extremely A few CN access category;Alternatively, the first downstream message may include the first mapping ruler, the first mapping ruler includes at least one A CN access category;Alternatively, the first downstream message may include CN Allowed NSSAI list.
Optionally, when the first mapping ruler and CN Allowed NSSAI list require to issue RAN, under first Row message may include the first mapping ruler, and CN Allowed NSSAI list can also be sent to by another downstream message RAN.First mapping ruler can be with reference to shown in above-mentioned table 2 and table 3, and details are not described herein again.Wherein, the first downstream message can be NAS message is sent by CN and RAN interface to RAN, such as: CN sends the first downstream message to RAN by N2 interface.
304, RAN obtains the second mapping ruler, and second mapping ruler includes the letter of at least one RAN network slice Breath.
In the embodiment of the present application, RAN receives the first downstream message that CN is sent.First downstream message may include first Mapping ruler and CN Allowed NSSAI list, the first mapping ruler include at least one CN access category;Alternatively, under first Row message may include the first mapping ruler, and the first mapping ruler includes at least one CN access category;Alternatively, the first downlink disappears Breath may include CN Allowed NSSAI list.Further, RAN obtains the second mapping ruler, second mapping ruler Information including at least one RAN network slice.It optionally, may include the first mapping in received first downstream message of RAN Rule may include CN Allowed NSSAI list in another received downstream message.
If should be understood that includes CN Allowed NSSAI list in the received downstream message of RAN, it is described at least one There are mapping relations, the second mapping ruler may include for the information of RAN network slice and the CN Allowed NSSAI list The information and the CN Allowed NSSAI list of at least one RAN network slice;If in the received downstream message of RAN It does not include CN Allowed NSSAI list, then the information and currently available CN network that at least one described RAN network is sliced The information of slice there are mapping relations, the second mapping ruler may include described at least one RAN network slice information with work as The information of preceding available CN network slice.
Illustratively, RAN preserves the information of preset RAN network slice and the mapping of the information of CN network slice is closed System for example, the mapping relations can be pre-configured with by network management, or is believed by CN equipment by the interface between CN and RAN Breath is pre-configured with.The information of one or more CN network slices can correspond to the information of RAN network slice, such as the following table 4 institute Show:
RAN Network slice, the information of access net network slice CN Network slice, the information of core net network slice
1 1,2
2 3,4
3 5,6,7,8
4 9,10,11,12
5 13,14
6 15,16
7 17,18,19
8 20,21,22
9 23,24
10 25,26
Table 4
(1) if including CN Allowed NSSAI list in the received downstream message of RAN, the second mapping ruler can root It is found out as shown in Table 4 above according to the mapping relations of the information of the information and CN network slice of preset RAN network slice The information of corresponding at least one the RAN network slice of CN Allowed NSSAI list is as the second mapping ruler.Further, By the information MAP of at least one RAN network slice to a specific access category (Access category), this access Classification is properly termed as RAN access category.For example, the access category can use RAN network slice mark (RAN network Slice ID), a new access category also can be used, determine the second mapping ruler.Wherein, RAN access category can be managed Solution is corresponding to search at least one factor (information etc. of for example, at least RAN network slice) for including in the second mapping ruler Access control information index.
It should be understood that according to the explanation in step 302 it is found that CN Allowed NSSAI list is the Acceditation Area current in UE A kind of form of expression of information at least one the CN network slice for allowing to access, so, CN Allowed NSSAI list is also It is the information of at least one CN network slice, such as: CN Allowed NSSAI list is as shown in table 5:
CN Allowed NSSAI list
3
9
17
20
Table 5
In table 5, it 3,9,17 and 20 can be the mark that CN network is sliced, be also possible to network slice type, service class The instructions such as type, the differentiation of network slice, tenant's information, subscriber group information, network slice example information, proprietary core network identifier, are used It is sliced to distinguish different CN networks, specifically without limitation.
Such as: as shown in table 6, the second mapping ruler may include the information of at least one RAN network slice, this at least one The information of a RAN network slice is found out in above-mentioned table 4 by list shown in table 5, because of CN Allowed NSSAI list is the information of at least one CN network slice, it is possible to the information and CN net being sliced by preset RAN network The mapping relationship searching of the information of network slice.Wherein, the information of RAN network slice can be sliced with RAN network identifies to indicate, It is as follows:
The information of at least one RAN network slice corresponding with CN Allowed NSSAI list
2
4
7
8
Table 6
In the scheme shown in table 6, UE can carry out access control inspection according to the information that at least one RAN network is sliced It looks into, because information of the information of RAN network slice generally with CN network slice is one-to-many relationship, the second mapping rule Configuration content then is less than existing configuration content, and complexity is lower.Also achieve the control of RAN network slice granularity.Also solve The inconsistent situation of the information of the CN network slice of the information and CN distribution of the CN network slice of the UE that determined request, because of the mutually same trade The information MAP of the different CN networks slice of service type is identical in the information majority of case that the RAN network of RAN is sliced.
Such as: as shown in table 7, the second mapping ruler may include the information and at least one of at least one RAN network slice The mapping relations of a RAN access category, as follows:
Table 7
In the scheme shown in table 7, UE can be according to the information or at least one RAN that at least one RAN network is sliced Access category carries out access control and checks, improves the washability and flexibility of technical scheme.Because RAN network is sliced Information of the information generally with CN network slice be one-to-many relationship, so, the configuration content of the second mapping ruler is less than existing Some configuration contents, complexity are lower.Realize the control of RAN network slice granularity.The CN network for also solving UE request is cut The inconsistent situation of the information of the CN network slice of information and the CN distribution of piece, because the different CN networks of identical services type are cut The information MAP of piece is identical in the information majority of case that the RAN network of RAN is sliced.
Such as: as shown in table 8, the second mapping ruler may include the information and at least one of at least one RAN network slice The mapping relations of the information of a CN network slice, as follows:
Table 8
In the scheme shown in table 8, the information that UE can be sliced according at least one RAN network carries out RAN network slice Access control check, alternatively, can according at least one CN network be sliced information carry out CN network slice access control It checks, improves the washability and flexibility of technical scheme.Because the information of RAN network slice is generally cut with CN network The information of piece is one-to-many relationship, so, the configuration content of the second mapping ruler is less than existing configuration content, complexity compared with It is low.Realize the control of RAN network slice granularity.Also solve the information of the CN network slice of UE request and the CN net of CN distribution The inconsistent situation of information of network slice, because the information MAP that is sliced of the different CN networks of identical services type is in the RAN of RAN The information majority of case of network slice is identical.
Such as: as shown in table 9, the second mapping ruler may include at least one RAN network slice information, at least one The information of CN network slice and the mapping relations of at least one RAN access category, as follows:
Table 9
In the scheme shown in table 9, the information that UE can be sliced according at least one RAN network carries out RAN network slice Access control check, alternatively, can according at least one CN network be sliced information carry out CN network slice access control It checks, alternatively, the access that can also carry out RAN network slice according at least one RAN access category is controlled and checked, improves this Apply for the washability and flexibility of technical solution.Because information of the information of RAN network slice generally with CN network slice is one To more relationships, so, the configuration content of the second mapping ruler is less than existing configuration content, and complexity is lower.Realize RAN The control of network slice granularity.Also solve the information of the information of the CN network slice of UE request and the CN network slice of CN distribution Inconsistent situation, because of the letter that the information MAP that the different CN networks of identical services type are sliced is sliced in the RAN network of RAN It is identical for ceasing majority of case.
It should be noted that in the second mapping ruler described in above-mentioned table 7-9, the letter of at least one RAN network slice Breath can be at least one RAN access category, alternatively, CN Allowed NSSAI list, alternatively, CN Allowed NSSAI is arranged There are mapping relations at least one RAN access category for table, still, can also not include at least one in the second mapping ruler RAN access category, alternatively, CN Allowed NSSAI list, alternatively, CN Allowed NSSAI list and at least one RAN Access category, RAN know their mapping relations just, specifically without limitation.
(2) if not comprising CN Allowed NSSAI list in the received downstream message of RAN, the second mapping ruler can be with It is searched as shown in Table 4 above according to the information of preset RAN network slice and the mapping relations of the information of CN network slice Currently available CN network, i.e., be sliced by the information that at least one CN network that current RAN or whole network allow out is sliced Information corresponding at least one RAN network slice information as the second mapping ruler.Further, by least one RAN To a specific access category (Access category), this access category is properly termed as the information MAP of network slice RAN access category.For example, the access category can use RAN network slice mark (Network RAN part ID, NSRPI), Also a new access category can be used, determine the second mapping ruler.RAN access category can be understood as searching the second mapping At least one the corresponding access control information of factor (information etc. of for example, at least RAN network slice) for including in rule Index.
Such as: can be any shown with reference to above-mentioned table 6, table 7, table 8 and table 9, the second mapping ruler may include at least one The information of a RAN network slice, alternatively, may include that the information of at least one RAN network slice and at least one RAN access class Other mapping relations, alternatively, may include the information of at least one RAN network slice and the information of at least one CN network slice Mapping relations, alternatively, may include at least one RAN network slice information, at least one CN network slice information and The mapping relations of at least one RAN access category.It should be understood that in the implementation of (2), at least one identified CN network The information of slice is that RAN is determined according to the information that currently available CN network is sliced, at least one identified CN network The quantity of the information of slice is likely larger than the number of the information of the slice of at least one CN network determined by the mode equal to above-mentioned (1) Amount.
It should be noted that without CN Allowed NSSAI list, RAN is according to current in the implementation of (2) The information at least one CN network slice that the information of available CN network slice determines.So with reference to described in above-mentioned table 7-9 The second mapping ruler in, at least one RAN network slice information can at least one RAN access category, alternatively, currently The information of available CN network slice, alternatively, information and at least one RAN access category that currently available CN network is sliced are deposited In mapping relations, still, at least one RAN access category, currently available CN can also not be included in the second mapping ruler The information of network slice, alternatively, information that currently available CN network is sliced and at least one RAN access category, do not do specifically It limits.
It optionally, can also include except above-mentioned at least one mentioned RAN network is sliced in the second mapping ruler It can also include other factors, specifically except information, the information of at least one CN network slice, at least one CN access category Without limitation.
It should be noted that in the embodiment of the present application, the information of at least one RAN network slice can use self-defining With at least one CN network slice there is the mark of mapping relations to indicate, RAN network slice mark, RAN net can also be used Network slice type information, RAN type of service, the differentiation of RAN network slice, RAN tenant's information, RAN network slice example information etc. It indicates, for distinguishing different RAN network slices, specifically without limitation.
Further, in the embodiment of the present application, if in the first downstream message including the first mapping ruler, RAN Only play the role of forwarding, i.e., the first mapping ruler is transmitted to UE.It should be understood that RAN access category can use number, word Mother, byte etc. indicate, are not specifically limited in the embodiment of the present application.
305, the second downstream message is sent to UE by RAN, and the second downstream message includes the second mapping ruler.
In the embodiment of the present application, after RAN obtains the second mapping ruler, the second downlink information, institute can be sent to UE Stating the second downlink information includes the second mapping ruler, and second mapping ruler includes the information of at least one RAN network slice; UE receives the second downstream message from RAN.Wherein, second downstream message can be wireless heterogeneous networks (Radio Resource Control, RRC) etc. AS message.Second mapping ruler can refer to above-mentioned table 6, table 7, table 8 and any institute of table 9 Show, details are not described herein again.
Optionally, the second downstream message can also include the first mapping ruler, and the first mapping ruler includes at least one CN Access category, alternatively, the first mapping ruler is sent to UE by another downstream message by RAN, the first mapping ruler can join It is admitted to and states shown in table 2 and table 3, details are not described herein again.
306, UE determines the information of at least one RAN network slice according to the second mapping ruler.
In the embodiment of the present application, UE receives the second downstream message that RAN is sent, and reflects in the second downstream message including second Rule is penetrated, second mapping ruler includes the information of at least one RAN network slice.Second mapping ruler can refer to above-mentioned Table 6, table 7, table 8 and table 9 are any shown, and details are not described herein again.
It optionally, include the first mapping ruler in second mapping ruler, alternatively, UE receives another downstream message, It include the first mapping ruler in another downstream message, the first mapping ruler includes at least one CN access category.
307, access control information is sent to UE by RAN.
In the embodiment of the present application, RAN sends RAN access control information to UE, and UE is received to be accessed from the RAN of RAN Control information.It should be understood that RAN access control information can be the access control information of the information of all RAN network slices, it can also Access to be the information that at least one above-mentioned RAN network is sliced controls information.
Optionally, RAN sends CN access control information to UE, and UE receives the CN access control information from RAN.Ying Li Solution, CN access control information can be the access control information of the information of all CN network slices, is also possible to above-mentioned at least one The access of the information of a CN network slice controls information.
308, UE carries out access control according to the second mapping ruler and access control information.
In the embodiment of the present application, UE can carry out access restriction according to the second mapping ruler and RAN access control information It checks.Before initiating access attempts, UE can be accessed according to the information or at least one RAN that at least one network RAN is sliced The corresponding access control information of classification executes ABC, to judge whether that access or service request can be initiated.
A kind of possible mode are as follows: corresponding access control information has access restriction timer.If RAN network slice is set The access restriction timer set is currently running, then terminal device determines that the secondary network insertion request or service request cannot be sent out It rises.Otherwise, terminal device selects an equally distributed random number between 0 and 1 using random number algorithm;If should be with Machine number is less than the corresponding access restriction factor in access control information, then terminal device determines that RAN network slice can access; If the random number is greater than or equal to the corresponding access restriction factor, terminal device determines that RAN network slice cannot connect Enter, and terminal device starts the RAN network and is sliced corresponding access restriction timer, illustratively, access restriction timing The timed length of device can be (0.7+0.6* random number) * access restriction time.
Alternatively possible mode are as follows: RAN access control information include a bit map, the bit map not on year-on-year basis Special position corresponds to the information or different RAN access categories that different RAN networks is sliced.Such as corresponding bit numerical value is " 0 " indicates that this network slice access request or service request can be initiated, otherwise cannot initiate.Specific ABC mechanism can also With any ABC applicable with reference to LTE system or 5G system, here without limitation.If do not limited, UE is to first RAN network slice initiates access attempts or service request.
Optionally, UE can carry out access restriction inspection according to the first mapping ruler and CN access control information.Initiation connects Before entering trial, UE can according to the information that at least one network RAN is sliced or at least one RAN access category is corresponding connects Enter to control information and execute ABC, to judge whether that access or service request can be initiated.Specific ABC mechanism can refer to LTE system Any ABC that system or 5G system are applicable in, here without limitation.If do not limited, UE can be cut to the first CN network Piece initiates access attempts or service request.
It should be noted that RAN according to the second mapping ruler and access control information carry out access control check include but Above-mentioned two kinds of mentioned possible implementations are not limited to, other are connect according to the second mapping ruler and access control information Enter mode that control checks also within the scope of protection of this application.
In the embodiment of the present application, RAN sends the second downstream message to UE, and second downstream message includes the second mapping rule Then, second mapping ruler includes the information of at least one RAN network slice;The RAN sends RAN access control to the UE Information processed.It should be noted that the second mapping ruler that RAN is determined, receives the first mapping ruler that CN is sent with RAN and does not close System.The first RAN network that UE can be accessed in the information that control information is sliced at least one described RAN network according to RAN is cut The information of piece initiates access request.Because the information of RAN network slice and the information that CN network is sliced are usually one-to-many reflect Relationship is penetrated, so, what RAN included into the second mapping ruler that UE is sent is the information of at least one RAN network slice, relatively For the prior art, the configuration of the second mapping ruler is smaller in the embodiment of the present application, and complexity is relatively low.Solves CN The information of network slice is more, and NAS level form is caused to configure excessive, the excessively high problem of complexity.Further, UE is solved The inconsistent situation of the information of the CN network slice of the information and CN distribution of the CN network slice of request, because of identical services type Different CN networks slice information MAP RAN RAN network be sliced information majority of case be identical.It also achieves Access control of the RAN based on RAN network slice granularity.
As shown in figure 4, for another embodiment schematic diagram of connection control method in the embodiment of the present application, comprising:
401, upstream message is sent to CN by UE.
402, CN obtains the first mapping ruler.
In the embodiment of the present application, step 401 and 402 similar with above-mentioned step 301 shown in Fig. 3 and 302, herein no longer It repeats.
403, the first downstream message is sent to RAN by CN, and the first downstream message includes the first mapping ruler.
In the embodiment of the present application, CN sends the first downstream message to RAN, and RAN reception disappears from the first downlink of CN Breath.It include the first mapping ruler in first downstream message, the first mapping ruler includes at least one CN access category, can be referred to Shown in above-mentioned table 2 and table 3, details are not described herein again.
It optionally, can also include CN Allowed NSSAI list in the first downstream message, alternatively, CN passes through another CN Allowed NSSAI list is sent to RAN by downstream message.It should be understood that the first downstream message can be NAS message, pass through CN and RAN interface is sent to RAN, such as: CN sends the first downstream message to RAN by N2 interface.
It should be noted that the method for determination of CN Allowed NSSAI list are as follows: CN can permit according to the CN that UE is reported Perhaps network slice selection auxiliary information (CN NSSAI), the signing information of UE, local policy, network slice availability etc. because The information at least one CN network slice that UE allows to access in current Acceditation Area, at least one CN network are agreed in element selection The information of slice can be presented in the form of a list, can be described as NSSAI (CN Allowed NSSAI) list of CN permission, can also To indicate in other manners, specifically without limitation.
404, RAN obtains the second mapping ruler, and second mapping ruler includes the letter of at least one RAN network slice Breath.
In the embodiment of the present application, RAN receives the first downstream message that CN is sent.First downstream message includes the first mapping Rule, the first mapping ruler include at least one CN access category.Optionally, the first downstream message can also include CN Allowed NSSAI list, alternatively, it includes CN Allowed NSSAI list in another downstream message that RAN, which is received,.Further , RAN obtains the second mapping ruler, and second mapping ruler includes the information of at least one RAN network slice.
If should be understood that includes CN Allowed NSSAI list in the received downstream message of RAN, it is described at least one There are mapping relations, the second mapping ruler may include for the information of RAN network slice and the CN Allowed NSSAI list The information and the CN Allowed NSSAI list of at least one RAN network slice;If in the received downstream message of RAN It does not include CN Allowed NSSAI list, then the information and currently available CN network that at least one described RAN network is sliced The information of slice there are mapping relations, the second mapping ruler may include described at least one RAN network slice information with work as The information of preceding available CN network slice.
It should be noted that the second mapping ruler can add at least one RAN network slice on the first mapping ruler Information generate, determined alternatively, the second mapping ruler is RAN according to the first mapping ruler and CN Allowed NSSAI list , alternatively, the second mapping ruler is that RAN is determined according to the information of the first mapping ruler and currently available CN network slice.
Illustratively, RAN preserves the information of preset RAN network slice and the mapping of the information of CN network slice is closed System for example, the mapping relations can be pre-configured with by network management, or is believed by CN equipment by the interface between CN and RAN Breath is pre-configured with.The information of one or more CN network slices can correspond to the information of RAN network slice, such as the following table 10 institute Show:
RAN Network slice, the information of access net network slice CN Network slice, the information of core net network slice
1 1,2
2 3,4
3 5,6,7,8
4 9,10,11,12
5 13,14
6 15,16
7 17,18,19
8 20,21,22
9 23,24
10 25,26
Table 10
It should be understood that according to the explanation in above-mentioned steps it is found that CN Allowed NSSAI list is the registration current in UE A kind of form of expression of the information at least one CN network slice that area allows to access, so, CN Allowed NSSAI list The namely information of at least one CN network slice, such as: CN Allowed NSSAI list is as shown in table 11:
CN Allowed NSSAI list
3
9
17
20
Table 11
In table 11,3,9,17 and 20 can be the mark of CN network slice, be also possible to network slice type, service class The instructions such as type, the differentiation of network slice, tenant's information, subscriber group information, network slice example information, proprietary core network identifier, are used It is sliced to distinguish different CN networks, specifically without limitation.
(1) if, include the first mapping ruler and CN Allowed NSSAI list, RAN in the received downstream message of RAN The letter of corresponding at least one RAN network slice can be found in above-mentioned table 10 according to CN Allowed NSSAI list Breath, the information that the second mapping ruler adds at least one RAN network slice on above-mentioned first mapping ruler generate.It is exemplary , the second mapping ruler can include but is not limited to following several forms, as follows:
If 1) the first mapping ruler is above-mentioned table 2, the second mapping ruler is added on the basis of the first mapping ruler The information of few RAN network slice generates, then the second mapping ruler can be as shown in table 12 below:
Table 12
In the scheme shown in table 12, the information that UE can be sliced according at least one RAN network, alternatively, at least one CN access category carries out access control and checks, because the information of RAN network slice is generally a pair of with the information of CN network slice More relationships also achieves the control of RAN network slice granularity, and the information and CN for solving the CN network slice of UE request are distributed CN network slice the inconsistent situation of information because the information MAP that the different CN networks of identical services type are sliced exists The information majority of case of the RAN network slice of RAN is identical.
If 2) the first mapping ruler is above-mentioned table 2, the second mapping ruler is added on the basis of the first mapping ruler The information of few RAN network slice and at least one RAN access category generate.Wherein, RAN access category can be understood as looking into Look at least one the corresponding access of factor (information etc. of for example, at least RAN network slice) for including in the second mapping ruler Control the index of information.To a specific access category, this connects the information MAP that at least one RAN network can be sliced Enter classification and is properly termed as RAN access category.So the second mapping ruler can be as shown in table 13 below:
Table 13
In the scheme shown in table 13, the information that UE can be sliced according at least one RAN network, alternatively, can basis The access that at least one RAN access category carries out RAN network slice, which controls, to be checked, alternatively, can be accessed according at least one CN The access that classification carries out RAN network slice, which controls, to be checked.Because of information of the information of RAN network slice generally with CN network slice One-to-many relationship, also achieve RAN network slice granularity control, solve UE request CN network slice information with The inconsistent situation of the information of the CN network slice of CN distribution, because the information that the different CN networks of identical services type are sliced is reflected Penetrate RAN RAN network slice information majority of case be identical.
If 3) the first mapping ruler is above-mentioned table 2, the second mapping ruler is added on the basis of the first mapping ruler The information of few RAN network slice and corresponding at least one the CN network slice of CN NSSAI list generate.So second reflects Penetrating rule can be as shown in table 14 below:
Table 14
In the scheme shown in table 14, the information that UE can be sliced according at least one RAN network carries out RAN network slice Access control check, alternatively, can according at least one CN network be sliced information carry out CN network slice access control It checks, improves the washability and flexibility of technical scheme.The control of RAN network slice granularity is also achieved, is solved The inconsistent situation of the information of the CN network slice of the information and CN distribution of the CN network slice of UE request, because of identical services The information MAP of the different CN networks slice of type is identical in the information majority of case that the RAN network of RAN is sliced.
If 4) the first mapping ruler is above-mentioned table 2, the second mapping ruler is added on the basis of the first mapping ruler Information, at least one RAN access category and at least one corresponding CN network of CN NSSAI list of few RAN network slice The information of slice generates.Wherein, RAN access category can be understood as searching at least one factor for including in the second mapping ruler The index of (information etc. of for example, at least RAN network slice) corresponding access control information.It can be by least one RAN net For the information MAP of network slice to a specific access category, this access category is properly termed as RAN access category.So second Mapping ruler can be as shown in table 15 below:
Table 15
In the scheme shown in table 15, the information that UE can be sliced according at least one RAN network carries out RAN network slice Access control check, alternatively, can according at least one CN network be sliced information carry out CN network slice access control It checks, alternatively, the access that RAN network slice can also be carried out according at least one RAN access category is controlled and is checked, alternatively, can It is controlled with to carry out the access of CN network slice according at least one CN access category and is checked, improve technical scheme can The property selected and flexibility.The control of RAN network slice granularity is also achieved, solves the information and CN of the CN network slice of UE request The inconsistent situation of the information of the CN network slice of distribution, because of the information MAP that the different CN networks of identical services type are sliced It is identical in the information majority of case that the RAN network of RAN is sliced.
If 5) the first mapping ruler is above-mentioned table 3, the second mapping ruler is added on the basis of the first mapping ruler The information of few RAN network slice generates, then the second mapping ruler can be as shown in table 16 below:
Table 16
In the scheme shown in table 16, the information that UE can be sliced according at least one RAN network carries out RAN network slice Access control check, alternatively, can according at least one CN network be sliced information or at least one CN network slice information The access for carrying out CN network slice, which controls, to be checked, the washability and flexibility of technical scheme are improved.Also achieve RAN Network is sliced the control of granularity, and the information for the CN network slice that the information and CN for solving the CN network slice of UE request are distributed is not Unanimous circumstances, because of the information that the information MAP that the different CN networks of identical services type are sliced is sliced in the RAN network of RAN Majority of case is identical.
If 6) the first mapping ruler is above-mentioned table 3, the second mapping ruler is added on the basis of the first mapping ruler The information of few RAN network slice and at least one RAN access category generate.Wherein, RAN access category can be understood as looking into Look at least one the corresponding access of factor (information etc. of for example, at least RAN network slice) for including in the second mapping ruler Control the index of information.To a specific access category, this connects the information MAP that at least one RAN network can be sliced Enter classification and is properly termed as RAN access category.So the second mapping ruler can be as shown in table 17 below:
Table 17
In the scheme shown in table 17, the information that UE can be sliced according at least one RAN network carries out RAN network slice Access control check, alternatively, can according at least one CN network be sliced information carry out CN network slice access control It checks, alternatively, the access that can also carry out RAN network slice according at least one RAN access category is controlled and checked, alternatively, also The access that CN network slice can be carried out according at least one CN access category, which controls, to be checked, technical scheme is improved Washability and flexibility.Also achieve RAN network slice granularity control, solve UE request CN network slice information with The inconsistent situation of the information of the CN network slice of CN distribution, because the information that the different CN networks of identical services type are sliced is reflected Penetrate RAN RAN network slice information majority of case be identical.
(2) if, include the first mapping ruler in the received downstream message of RNA, do not include CN NSSAI list, then RAN can To find corresponding at least one RAN network slice in above-mentioned table 10 according to the information of currently available CN network slice Information, the information that the second mapping ruler adds at least one RAN network slice on above-mentioned first mapping ruler generate.So, The second obtained mapping ruler can be with reference to shown in any implementation of above-mentioned table 12-17, and details are not described herein again.
(3) if, include the first mapping ruler and CN Allowed NSSAI list in the received downstream message of RAN, the Two mapping rulers are that RAN is determined according to the first mapping ruler and CN Allowed NSSAI list.Illustratively, the second mapping Rule may include any implementation of above-mentioned 12-17, but be not limited to above-mentioned several implementations, can also include others Implementation, as follows:
1) as shown in table 18 below, the second mapping ruler may include the information of at least one RAN network slice.
The information of at least one RAN network slice corresponding with CN Allowed NSSAI list
2
4
7
8
Table 18
In the scheme shown in table 18, UE can carry out access control inspection according to the information that at least one RAN network is sliced It looks into, because information of the information of RAN network slice generally with CN network slice is one-to-many relationship, the second mapping rule Configuration content then is less than existing configuration content, and complexity is lower.Also achieve the control of RAN network slice granularity.
2) as shown in table 19 below, the second mapping ruler may include the information and at least one of at least one RAN network slice The mapping relations of a RAN access category.
Table 19
In the scheme shown in table 19, UE can be according to the information or at least one RAN that at least one RAN network is sliced Access category carries out access control and checks, improves the washability and flexibility of technical scheme, because RAN network is sliced Information of the information generally with CN network slice be one-to-many relationship, so, the configuration content of the second mapping ruler is less than existing Some configuration contents, complexity are lower.Also achieve the control of RAN network slice granularity.
3) as shown in table 20 below, the second mapping ruler may include the information and at least one of at least one RAN network slice The mapping relations of the information of a CN network slice.
Table 20
In the scheme shown in table 19, the information that UE can be sliced according at least one RAN network carries out RAN network slice Access control check, alternatively, can according at least one CN network be sliced information carry out CN network slice access control It checks, improves the washability and flexibility of technical scheme, because the information of RAN network slice is generally cut with CN network The information of piece is one-to-many relationship, so, the configuration content of the second mapping ruler is less than existing configuration content, complexity compared with It is low.Also achieve the control of RAN network slice granularity.
4) as shown in table 21 below, the second mapping ruler may include at least one RAN network slice information, at least one The information of CN network slice and the mapping relations of at least one RAN access category.
Table 21
In the scheme shown in table 21, the information that UE can be sliced according at least one RAN network carries out RAN network slice Access control check, alternatively, can according at least one CN network be sliced information carry out CN network slice access control It checks, alternatively, the access that can also carry out RAN network slice according at least one RAN access category is controlled and checked, improves this Apply for the washability and flexibility of technical solution, because information of the information of RAN network slice generally with CN network slice is one To more relationships, so, the configuration content of the second mapping ruler is less than existing configuration content, and complexity is lower.It also achieves The control of RAN network slice granularity.
It should be noted that in the second mapping ruler described in above-mentioned table 18-21, at least one RAN network slice Information can be at least one RAN access category, alternatively, CN Allowed NSSAI list, alternatively, CN Allowed NSSAI List and at least one RAN access category, alternatively, at least one CN access category, alternatively, at least one CN access category and extremely A few RAN access category, alternatively, at least one CN access category and CN Allowed NSSAI list, there are mapping relations, But at least one RAN access category can also not included in the second mapping ruler, alternatively, CN Allowed NSSAI is arranged Table, alternatively, CN Allowed NSSAI list and at least one RAN access category, alternatively, at least one CN access category, or Person, at least one CN access category and at least one RAN access category, alternatively, at least one CN access category and CN Allowed NSSAI list, RAN know their mapping relations just, specifically without limitation.
(4) if, include the first mapping ruler in the received downstream message of RAN, do not include CN Allowed NSSAI list, Then the second mapping ruler is that RAN is determined according to the information of the first mapping ruler and currently available CN network slice.It is exemplary , the second mapping ruler can be with reference to the implementation any including above-mentioned 12-21, but is not limited to above-mentioned several implementations, Only in the implementation of above-mentioned 12-21, the information of at least one CN network slice is by CN Allowed NSSAI list Determining, and in the case that RAN does not receive CN Allowed NSSAI list, it is to be sliced according to currently available CN network What information determined.
It should be noted that in the embodiment of the present application, the information of at least one RAN network slice can use self-defining With at least one CN network slice there is the mark of mapping relations to indicate, RAN network slice mark, RAN net can also be used Network slice type information, RAN type of service, the differentiation of RAN network slice, RAN tenant's information, RAN network slice example information etc. It indicates, for distinguishing different RAN network slices, specifically without limitation.
It further, in the embodiment of the present application, include the first mapping ruler in the first downstream message, RAN can read the Second mapping ruler after generating the second mapping ruler, then is transmitted to UE by the content of one mapping ruler.It should be understood that RAN accesses class It can not indicated with number, letter, byte etc., be not specifically limited in the embodiment of the present application.
405, the second downstream message is sent to UE by RAN.
In the embodiment of the present application, after RAN obtains the second mapping ruler, the second downlink information, institute can be sent to UE Stating the second downlink information includes the second mapping ruler, and second mapping ruler includes the information of at least one RAN network slice; UE receives the second downstream message from RAN.Wherein, second downstream message can be wireless heterogeneous networks (Radio Resource Control, RRC) etc. AS message.Second mapping ruler can be any shown with reference to above-mentioned table 12-20, herein not It repeats again.
Optionally, the second downstream message can also include the first mapping ruler, and the first mapping ruler includes at least one CN Access category, alternatively, the first mapping ruler is sent to UE by another downstream message by RAN, the first mapping ruler can join It is admitted to and states shown in table 2 and table 3, details are not described herein again.
406, UE determines the information of at least one RAN network slice according to the second mapping ruler.
In the embodiment of the present application, UE receives the second downstream message that RAN is sent, and reflects in the second downstream message including second Rule is penetrated, second mapping ruler includes the information of at least one RAN network slice.Second mapping ruler can refer to above-mentioned Shown in table 12-20 is any, details are not described herein again.
It optionally, include the first mapping ruler in second mapping ruler, alternatively, UE receives another downstream message, It include the first mapping ruler in another downstream message, the first mapping ruler includes at least one CN access category.
407, access control information is sent to UE by RAN.
In the embodiment of the present application, RAN sends RAN access control information to UE, and UE is received to be accessed from the RAN of RAN Control information.It should be understood that RAN access control information can be the access control information of the information of all RAN network slices, it can also Access to be the information that at least one above-mentioned RAN network is sliced controls information.
Optionally, RAN sends CN access control information to UE, and UE receives the CN access control information from RAN.Ying Li Solution, CN access control information can be the access control information of the information of all CN network slices, is also possible to above-mentioned at least one The access of the information of a CN network slice controls information.
408, UE carries out access control according to the second mapping ruler and access control information.
In the embodiment of the present application, UE can carry out access restriction according to the second mapping ruler and RAN access control information It checks.Before initiating access attempts, UE can be accessed according to the information or at least one RAN that at least one network RAN is sliced The corresponding access control information of classification executes ABC, to judge whether that access or service request can be initiated.
A kind of possible mode are as follows: corresponding access control information has access restriction timer.If RAN network slice is set The access restriction timer set is currently running, then terminal device determines that the secondary network insertion request or service request cannot be sent out It rises.Otherwise, terminal device selects an equally distributed random number between 0 and 1 using random number algorithm;If should be with Machine number is less than the corresponding access restriction factor in access control information, then terminal device determines that RAN network slice can access; If the random number is greater than or equal to the corresponding access restriction factor, terminal device determines that RAN network slice cannot connect Enter, and terminal device starts the RAN network and is sliced corresponding access restriction timer, illustratively, access restriction timing The timed length of device can be (0.7+0.6* random number) * access restriction time.
Alternatively possible mode are as follows: RAN access control information include a bit map, the bit map not on year-on-year basis Special position corresponds to the information or different RAN access categories that different RAN networks is sliced.Such as corresponding bit numerical value is " 0 " indicates that this network slice access request or service request can be initiated, otherwise cannot initiate.Specific ABC mechanism can also With any ABC applicable with reference to LTE system or 5G system, here without limitation.If do not limited, UE is to first RAN network slice initiates access attempts or service request.
Optionally, UE can carry out access restriction inspection according to the first mapping ruler and CN access control information.Initiation connects Before entering trial, UE can according to the information that at least one network RAN is sliced or at least one RAN access category is corresponding connects Enter to control information and execute ABC, to judge whether that access or service request can be initiated.Specific ABC mechanism can refer to LTE system Any ABC that system or 5G system are applicable in, here without limitation.If do not limited, UE can be cut to the first CN network Piece initiates access attempts or service request.
It should be noted that RAN according to the second mapping ruler and access control information carry out access control check include but Above-mentioned two kinds of mentioned possible implementations are not limited to, other are connect according to the second mapping ruler and access control information Enter mode that control checks also within the scope of protection of this application.
In the embodiment of the present application, RAN sends the second downstream message to UE, and second downstream message includes the second mapping rule Then, second mapping ruler includes the information of at least one RAN network slice;The RAN sends RAN access control to the UE Information processed.It should be noted that the second mapping ruler that RAN is determined, it is related to receive the first mapping ruler that CN is sent with RAN System.The first RAN network that UE can be accessed in the information that control information is sliced at least one described RAN network according to RAN is cut The information of piece initiates access request.Because the information of RAN network slice and the information that CN network is sliced are usually one-to-many reflect Relationship is penetrated, so, what RAN included into the second mapping ruler that UE is sent is the information of at least one RAN network slice, relatively For the prior art, the configuration of the second mapping ruler is smaller in the embodiment of the present application, and complexity is relatively low.Solves CN The information of network slice is more, and NAS level form is caused to configure excessive, the excessively high problem of complexity.Further, UE is solved The inconsistent situation of the information of the CN network slice of the information and CN distribution of the CN network slice of request, because of identical services type Different CN networks slice information MAP RAN RAN network be sliced information majority of case be identical.It also achieves Access control of the RAN based on RAN network slice granularity.
The method that control is accessed in the embodiment of the present application is illustrated above, below to the net in the embodiment of the present application Network equipment and terminal device are illustrated, and are one embodiment signal of the network equipment in the embodiment of the present application as shown in Figure 5A Scheme, may include:
First sending module 501, for sending first message to terminal device, the first message includes the first mapping rule Then, first mapping ruler includes the information of at least one wireless access network network slice;
Second sending module 502, for sending access control information to the terminal device.
It should be understood that first sending module and second sending module can be provided separately in logic, it can also Being realized with the same module.
Optionally, in some embodiments of the present application, first mapping ruler and access control information are used for Access control is carried out to the terminal device.
It optionally, is the another of the network equipment in the embodiment of the present application as shown in Figure 5 B in some embodiments of the present application One embodiment schematic diagram, the network equipment can also include:
Receiving module 503, for receiving the second message from second network equipment, the second message includes second Mapping ruler, second mapping ruler include at least one core net access category, and first mapping ruler further includes institute State the information of at least one wireless access network network slice and the mapping relations of at least one core net access category;
Alternatively,
Receiving module 502, for receiving the second message from second network equipment, the second message includes core The network that net network allows is sliced selection auxiliary information Allowed NSSAI list, and first mapping ruler further includes described The information of at least one wireless access network network slice and the mapping relations of the core net Allowed NSSAI list;
Alternatively,
Receiving module 502, for receiving the second message from second network equipment, the second message includes second The network that mapping ruler and core net network allow is sliced selection auxiliary information Allowed NSSAI list, second mapping Rule includes at least one core net access category, and first mapping ruler further includes at least one described wireless access network net Information, at least one described core net access category and the mapping of the core net Allowed NSSAI list of network slice are closed System.
Optionally, in some embodiments of the present application, first mapping ruler further includes that described at least one is wireless The mapping relations for the information that the information and currently available core net network for accessing net network slice are sliced.
Optionally, in some embodiments of the present application, first mapping ruler further includes that described at least one is wireless Access the information of net network slice and the mapping relations of at least one wireless access network access category.
As shown in Figure 6A, it is one embodiment schematic diagram of terminal device in the embodiment of the present application, may include:
Receiving module 601, for receiving the first message from first network equipment, the first message includes first Mapping ruler, first mapping ruler include the information of at least one wireless access network network slice;
Second receiving module, 602 receive the access control information from the first network equipment.
It should be understood that first receiving module and second receiving module can be provided separately in logic, it can also Being realized with the same module.
It optionally, is the another of terminal device in the embodiment of the present application as shown in Figure 6B in some embodiments of the present application One embodiment schematic diagram, the terminal device further include:
Processing module 603, for carrying out access control according to first mapping ruler and access control information.
Optionally, in some embodiments of the present application, first mapping ruler further includes that described at least one is wireless Access the information of net network slice and the mapping relations of at least one wireless access network access category.
Optionally, in some embodiments of the present application, first mapping ruler further includes that described at least one is wireless Access the information of net network slice and the mapping relations of at least one core net access category.
As shown in fig. 7, for another embodiment schematic diagram of the network equipment in the embodiment of the present application, comprising:
The network equipment can generate bigger difference because configuration or performance are different, may include one or more Central processing unit (central processing units, CPU) 722 (for example, one or more processors) and storage Device 732, one or more storage application programs 742 or data 744 storage medium 730 (such as one or more Mass memory unit).Wherein, memory 732 and storage medium 730 can be of short duration storage or persistent storage.It is stored in storage The program of medium 730 may include one or more modules (diagram does not mark), and each module may include setting to network Series of instructions operation in standby.Further, central processing unit 722 can be set to communicate with storage medium 730, in net The series of instructions operation in storage medium 730 is executed in network equipment.
The network equipment can also include one or more power supplys 726, one or more wired or wireless networks Interface 750, one or more input/output interfaces 758, and/or, one or more operating systems 741, such as Windows ServerTM, Mac OS XTM, UnixTM, LinuxTM, FreeBSDTM etc..
The step as performed by the network equipment can be based on the network equipment infrastructure shown in Fig. 7 in above-described embodiment.
As shown in figure 8, for another embodiment schematic diagram of the network equipment in the embodiment of the present application.
For ease of description, part relevant to the embodiment of the present application is illustrated only, it is disclosed by specific technical details, it asks Referring to the embodiment of the present application method part.The terminal device can be include mobile phone, tablet computer, PDA (Personal Digital Assistant, personal digital assistant), POS (Point of Sales, point-of-sale terminal), vehicle-mounted computer etc. it is any eventually End equipment, by taking terminal device is mobile phone as an example:
Fig. 8 shows the block diagram of the part-structure of mobile phone relevant to terminal device provided by the embodiments of the present application.Ginseng Fig. 8 is examined, mobile phone includes: radio frequency (Radio Frequency, RF) circuit 810, memory 820, input unit 830, display unit 840, sensor 850, voicefrequency circuit 860, Wireless Fidelity (wireless fidelity, WiFi) module 870, processor 880, And the equal components of power supply 890.It will be understood by those skilled in the art that handset structure shown in Fig. 8 is not constituted to mobile phone It limits, may include perhaps combining certain components or different component layouts than illustrating more or fewer components.
It is specifically introduced below with reference to each component parts of the Fig. 8 to mobile phone:
RF circuit 810 can be used for receiving and sending messages or communication process in, signal sends and receivees, particularly, by base station After downlink information receives, handled to processor 880;In addition, the data for designing uplink are sent to base station.In general, RF circuit 810 Including but not limited to antenna, at least one amplifier, transceiver, coupler, low-noise amplifier (Low Noise Amplifier, LNA), duplexer etc..In addition, RF circuit 810 can also be communicated with network and other equipment by wireless communication. Any communication standard or agreement, including but not limited to global system for mobile communications (Global can be used in above-mentioned wireless communication System of Mobile communication, GSM), general packet radio service (General Packet Radio Service, GPRS), CDMA (Code Division Multiple Access, CDMA), wideband code division multiple access (Wideband Code Division Multiple Access, WCDMA), long term evolution (Long Term Evolution, LTE), Email, short message service (Short Messaging Service, SMS) etc..
Memory 820 can be used for storing software program and module, and processor 880 is stored in memory 820 by operation Software program and module, thereby executing the various function application and data processing of mobile phone.Memory 820 can mainly include Storing program area and storage data area, wherein storing program area can application journey needed for storage program area, at least one function Sequence (such as sound-playing function, image player function etc.) etc.;Storage data area can be stored to be created according to using for mobile phone Data (such as audio data, phone directory etc.) etc..It, can be in addition, memory 820 may include high-speed random access memory Including nonvolatile memory, for example, at least a disk memory, flush memory device or other volatile solid-states Part.
Input unit 830 can be used for receiving the number or character information of input, and generate with the user setting of mobile phone with And the related key signals input of function control.Specifically, input unit 830 may include that touch panel 831 and other inputs are set Standby 832.Touch panel 831, also referred to as touch screen, collect user on it or nearby touch operation (such as user use The operation of any suitable object or attachment such as finger, stylus on touch panel 831 or near touch panel 831), and root Corresponding attachment device is driven according to preset formula.Optionally, touch panel 831 may include touch detecting apparatus and touch Two parts of controller.Wherein, the touch orientation of touch detecting apparatus detection user, and touch operation bring signal is detected, Transmit a signal to touch controller;Touch controller receives touch information from touch detecting apparatus, and is converted into touching Point coordinate, then gives processor 880, and can receive order that processor 880 is sent and be executed.Furthermore, it is possible to using electricity The multiple types such as resistive, condenser type, infrared ray and surface acoustic wave realize touch panel 831.In addition to touch panel 831, input Unit 830 can also include other input equipments 832.Specifically, other input equipments 832 can include but is not limited to secondary or physical bond One of disk, function key (such as volume control button, switch key etc.), trace ball, mouse, operating stick etc. are a variety of.
Display unit 840 can be used for showing information input by user or be supplied to user information and mobile phone it is various Menu.Display unit 840 may include display panel 841, optionally, can use liquid crystal display (Liquid Crystal Display, LCD), the forms such as Organic Light Emitting Diode (Organic Light-Emitting Diode, OLED) it is aobvious to configure Show panel 841.Further, touch panel 831 can cover display panel 841, when touch panel 831 detect it is on it or attached After close touch operation, processor 880 is sent to determine the type of touch event, is followed by subsequent processing device 880 according to touch event Type corresponding visual output is provided on display panel 841.Although in fig. 8, touch panel 831 and display panel 841 It is that the input and input function of mobile phone are realized as two independent components, but in some embodiments it is possible to by touch-control Panel 831 and display panel 841 are integrated and that realizes mobile phone output and input function.
Mobile phone may also include at least one sensor 850, such as optical sensor, motion sensor and other sensors. Specifically, optical sensor may include ambient light sensor and proximity sensor, wherein ambient light sensor can be according to ambient light Light and shade adjust the brightness of display panel 841, proximity sensor can close display panel 841 when mobile phone is moved in one's ear And/or backlight.As a kind of motion sensor, accelerometer sensor can detect (generally three axis) acceleration in all directions Size, can detect that size and the direction of gravity when static, can be used to identify the application of mobile phone posture, (for example horizontal/vertical screen is cut Change, dependent game, magnetometer pose calibrating), Vibration identification correlation function (such as pedometer, tap) etc.;May be used also as mobile phone The other sensors such as gyroscope, barometer, hygrometer, thermometer, the infrared sensor of configuration, details are not described herein.
Voicefrequency circuit 860, loudspeaker 861, microphone 862 can provide the audio interface between user and mobile phone.Audio-frequency electric Electric signal after the audio data received conversion can be transferred to loudspeaker 861, be converted to sound by loudspeaker 861 by road 860 Signal output;On the other hand, the voice signal of collection is converted to electric signal by microphone 862, is turned after being received by voicefrequency circuit 860 It is changed to audio data, then by after the processing of audio data output processor 880, such as another mobile phone is sent to through RF circuit 810, Or audio data is exported to memory 820 to be further processed.
WiFi belongs to short range wireless transmission technology, and mobile phone can help user's transceiver electronics postal by WiFi module 870 Part, browsing webpage and access streaming video etc., it provides wireless broadband internet access for user.Although Fig. 8 is shown WiFi module 870, but it is understood that, and it is not belonging to must be configured into for mobile phone, it can according to need do not changing completely Become in the range of the essence of invention and omits.
Processor 880 is the control centre of mobile phone, using the various pieces of various interfaces and connection whole mobile phone, is led to It crosses operation or executes the software program and/or module being stored in memory 820, and call and be stored in memory 820 Data execute the various functions and processing data of mobile phone, to carry out integral monitoring to mobile phone.Optionally, processor 880 can wrap Include one or more processing units;Preferably, processor 880 can integrate application processor and modem processor, wherein answer With the main processing operation system of processor, user interface and application program etc., modem processor mainly handles wireless communication. It is understood that above-mentioned modem processor can not also be integrated into processor 880.
Mobile phone further includes the power supply 890 (such as battery) powered to all parts, it is preferred that power supply can pass through power supply pipe Reason system and processor 880 are logically contiguous, to realize management charging, electric discharge and power managed by power-supply management system Etc. functions.
Although being not shown, mobile phone can also include camera, bluetooth module etc., and details are not described herein.
The step as performed by terminal device can be based on the terminal device knot shown in Fig. 8 in above method embodiment Structure, details are not described herein again.
The embodiment of the present application provides a kind of wireless communication device, and the composition component of the communication device can refer to 7 institute of earlier figures The network equipment shown.In a kind of feasible design, the hardware configuration of the communication device is necessary according to the embodiment of the present application institute Important document, may include:
At least one processor, memory, transmission circuit and bus system, the processor, the memory, the receipts Power Generation Road is coupled by the bus system, and the wireless communication device is communicated by the transmission circuit with terminal device, The memory is for storing program instruction, at least one described processor is for executing the journey stored in the memory Sequence instruction, so that first network equipment is (that is, wireless access network is set in wireless communication device execution the various embodiments described above It is standby) execute various feasible operations (for example, operation performed by Fig. 3 or wireless access network equipment illustrated in fig. 4).It is described Wireless communication device is also possible to apply the execution in wireless access network side apparatus corresponding either the wireless access network equipment The System on Chip/SoC of function.
The embodiment of the present application also provides a kind of wireless communication device, may include:
At least one processor, memory, transmission circuit and bus system, the processor, the memory, the receipts Power Generation Road is coupled by the bus system, and the wireless communication device is communicated by the transmission circuit with network side equipment Letter, the memory is for storing program instruction, at least one described processor is for executing the institute stored in the memory Program instruction is stated, so that the wireless communication device executes the various feasible operations that terminal device executes in the various embodiments described above (for example, operation performed by Fig. 3 or terminal device illustrated in fig. 4).The wireless communication device either terminal device, It is also possible to apply the System on Chip/SoC that corresponding function is executed in terminal device.
In the above-described embodiments, can come wholly or partly by software, hardware, firmware or any combination thereof real It is existing.When implemented in software, it can entirely or partly realize in the form of a computer program product.The computer program Product includes one or more computer instructions.When loading on computers and executing the computer program instructions, all or It partly generates according to process or function described in the embodiment of the present application.The computer can be general purpose computer, dedicated meter Calculation machine, computer network or other programmable devices.The computer instruction can store in computer readable storage medium In, or from a computer readable storage medium to the transmission of another computer readable storage medium, for example, the computer Instruction can pass through wired (such as coaxial cable, optical fiber, number from a web-site, computer, server or data center User's line (DSL)) or wireless (such as infrared, wireless, microwave etc.) mode to another web-site, computer, server or Data center is transmitted.The computer readable storage medium can be any usable medium that computer can access or It is comprising data storage devices such as one or more usable mediums integrated server, data centers.The usable medium can be with It is magnetic medium, (for example, floppy disk, hard disk, tape), optical medium (for example, DVD) or semiconductor medium (such as solid state hard disk Solid State Disk (SSD)) etc..
It is apparent to those skilled in the art that for convenience and simplicity of description, the system of foregoing description, The specific work process of device and unit, can refer to corresponding processes in the foregoing method embodiment, and details are not described herein.
In several embodiments provided herein, it should be understood that disclosed system, device and method can be with It realizes by another way.For example, the apparatus embodiments described above are merely exemplary, for example, the unit It divides, only a kind of logical function partition, there may be another division manner in actual implementation, such as multiple units or components It can be combined or can be integrated into another system, or some features can be ignored or not executed.Another point, it is shown or The mutual coupling, direct-coupling or communication connection discussed can be through some interfaces, the indirect coupling of device or unit It closes or communicates to connect, can be electrical property, mechanical or other forms.
The unit as illustrated by the separation member may or may not be physically separated, aobvious as unit The component shown may or may not be physical unit, it can and it is in one place, or may be distributed over multiple In network unit.It can select some or all of unit therein according to the actual needs to realize the mesh of this embodiment scheme 's.
It, can also be in addition, each functional unit in each embodiment of the application can integrate in one processing unit It is that each unit physically exists alone, can also be integrated in one unit with two or more units.Above-mentioned integrated list Member both can take the form of hardware realization, can also realize in the form of software functional units.
If the integrated unit is realized in the form of SFU software functional unit and sells or use as independent product When, it can store in a computer readable storage medium.Based on this understanding, the technical solution of the application is substantially The all or part of the part that contributes to existing technology or the technical solution can be in the form of software products in other words It embodies, which is stored in a storage medium, including some instructions are used so that a computer Equipment (can be personal computer, server or the network equipment etc.) executes the complete of each embodiment the method for the application Portion or part steps.And storage medium above-mentioned includes: USB flash disk, mobile hard disk, read-only memory (ROM, Read-Only Memory), random access memory (RAM, Random Access Memory), magnetic or disk etc. are various can store journey The medium of sequence code.
The above, above embodiments are only to illustrate the technical solution of the application, rather than its limitations;Although referring to before Embodiment is stated the application is described in detail, those skilled in the art should understand that: it still can be to preceding Technical solution documented by each embodiment is stated to modify or equivalent replacement of some of the technical features;And these It modifies or replaces, the spirit and scope of each embodiment technical solution of the application that it does not separate the essence of the corresponding technical solution.

Claims (26)

1. a kind of method of access control characterized by comprising
First network equipment to terminal device send first message, the first message include the first mapping ruler, described first Mapping ruler includes the information of at least one wireless access network network slice;
The first network equipment sends access control information to the terminal device.
2. the method according to shown in the 1 of claim, which is characterized in that first mapping ruler and the access control information It is used to carry out access control to the terminal device.
3. method according to claim 1 or 2, which is characterized in that the method also includes:
The first network equipment receives the second message from second network equipment, and the second message includes the second mapping Rule, second mapping ruler include at least one core net access category, first mapping ruler further include it is described extremely The information of few wireless access network network slice and the mapping relations of at least one core net access category.
4. method according to claim 1 or 2, which is characterized in that the method also includes:
The first network equipment receives the third message from second network equipment, and the third message includes core net net The network that network allows is sliced selection auxiliary information list, and first mapping ruler further includes at least one described wireless access network The network that the information of network slice and the core net network allow is sliced the mapping relations of selection auxiliary information list.
5. method according to claim 1 or 2, which is characterized in that the method also includes:
The first network equipment receives the 4th message from second network equipment, and the 4th message includes the second mapping The network that rule and core net network allow is sliced selection auxiliary information list, and second mapping ruler includes at least one core Heart net access category, first mapping ruler further include the information, described of at least one wireless access network network slice The mapping that the network that at least one core net access category and the core net network allow is sliced selection auxiliary information list is closed System.
6. method according to claim 1 to 3, which is characterized in that first mapping ruler further include it is described at least The mapping relations for the information that the information of one wireless access network network slice and currently available core net network are sliced.
7. -6 any method according to claim 1, which is characterized in that first mapping ruler further include it is described at least The information of one wireless access network network slice and the mapping relations of at least one wireless access network access category.
8. a kind of method of access control characterized by comprising
Terminal device receives the first message from first network equipment, and the first message includes the first mapping ruler, institute State the information that the first mapping ruler includes at least one wireless access network network slice;
The terminal device receives the access control information from the first network equipment.
9. according to the method described in claim 8, it is characterized in that, the method also includes:
The terminal device carries out access control according to first mapping ruler and access control information.
10. method according to claim 8 or claim 9, which is characterized in that first mapping ruler further includes described at least one The information of a wireless access network network slice and the mapping relations of at least one wireless access network access category.
11. according to any method of claim 8-9, which is characterized in that first mapping ruler further include it is described extremely The information of few wireless access network network slice and the mapping relations of at least one core net access category.
12. a kind of network equipment characterized by comprising
First sending module, for sending first message to terminal device, the first message includes the first mapping ruler, described First mapping ruler includes the information of at least one wireless access network network slice;
Second sending module, for sending access control information to the terminal device.
13. the network equipment according to claim 12, which is characterized in that first mapping ruler and access control Information is for carrying out access control to the terminal device.
14. the network equipment according to claim 12 or 13, which is characterized in that the network equipment further include:
Receiving module, for receiving the second message from second network equipment, the second message includes the second mapping rule Then, second mapping ruler includes at least one core net access category, first mapping ruler further include it is described at least The information of one wireless access network network slice and the mapping relations of at least one core net access category.
15. the network equipment according to claim 12 or 13, which is characterized in that the network equipment further include:
Receiving module, for receiving the second message from second network equipment, the second message includes core net network The network slice selection auxiliary information list of permission, first mapping ruler further includes at least one described wireless access network net The network that the information of network slice and the core net network allow is sliced the mapping relations of selection auxiliary information list.
16. the network equipment according to claim 12 or 13, which is characterized in that the network equipment further include:
Receiving module, for receiving the second message from second network equipment, the second message includes the second mapping rule The network then allowed with core net network is sliced selection auxiliary information list, and second mapping ruler includes at least one core Net access category, first mapping ruler further include at least one wireless access network network slice information, it is described extremely The network that a few core net access category and the core net network allow is sliced the mapping relations of selection auxiliary information list.
17. any network equipment of 2-14 according to claim 1, which is characterized in that first mapping ruler further includes The mapping for the information that the information of at least one wireless access network network slice and currently available core net network are sliced is closed System.
18. any network equipment of 2-17 according to claim 1, which is characterized in that first mapping ruler further includes The information of at least one wireless access network network slice and the mapping relations of at least one wireless access network access category.
19. a kind of terminal device characterized by comprising
First receiving module, for receiving the first message from first network equipment, the first message is reflected including first Rule is penetrated, first mapping ruler includes the information of at least one wireless access network network slice;
Second receiving module, for receiving the access control information from the first network equipment.
20. terminal device according to claim 19, which is characterized in that the terminal device further include:
Processing module is checked for carrying out access control according to first mapping ruler and access control information.
21. terminal device described in 9 or 20 according to claim 1, which is characterized in that first mapping ruler further includes described The information of at least one wireless access network network slice and the mapping relations of at least one wireless access network access category.
22. any terminal device of 9-21 according to claim 1, which is characterized in that first mapping ruler further includes The information of at least one wireless access network network slice and the mapping relations of at least one core net access category.
23. a kind of computer readable storage medium, it is stored with instruction in the computer readable storage medium, when it is in computer When upper operation, so that computer executes method described in described any one of claims 1 to 11.
24. a kind of computer program product comprising instruction, when run on a computer, so that computer executes the power Benefit require any one of 1 to 11 described in method.
25. a kind of wireless communication device characterized by comprising
At least one processor, memory, transmission circuit and bus system, the processor, the memory, the transmitting-receiving electricity Road is coupled by the bus system, and the wireless communication device is communicated by the transmission circuit with terminal device, described Memory refers to for storing program instruction, at least one described processor for executing the described program stored in the memory It enables, so that the wireless communication device completes first network equipment operation described in method as claimed in claim 1 Part.
26. a kind of wireless communication device characterized by comprising
At least one processor, memory, transmission circuit and bus system, the processor, the memory, the transmitting-receiving electricity Road is coupled by the bus system, and the wireless communication device is communicated by the transmission circuit with network side equipment, institute Memory is stated for storing program instruction, at least one described processor is for executing the described program stored in the memory Instruction, so that the wireless communication device completes the operation of the terminal device as described in the method as described in claim 8-11 is any Part.
CN201710459461.9A 2017-06-16 2017-06-16 Access control method, network equipment and terminal equipment Active CN109151950B (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN201710459461.9A CN109151950B (en) 2017-06-16 2017-06-16 Access control method, network equipment and terminal equipment
PCT/CN2018/091436 WO2018228517A1 (en) 2017-06-16 2018-06-15 Method for controlling access, network device, and terminal device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710459461.9A CN109151950B (en) 2017-06-16 2017-06-16 Access control method, network equipment and terminal equipment

Publications (2)

Publication Number Publication Date
CN109151950A true CN109151950A (en) 2019-01-04
CN109151950B CN109151950B (en) 2021-09-07

Family

ID=64659678

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710459461.9A Active CN109151950B (en) 2017-06-16 2017-06-16 Access control method, network equipment and terminal equipment

Country Status (2)

Country Link
CN (1) CN109151950B (en)
WO (1) WO2018228517A1 (en)

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2020199106A1 (en) * 2019-04-01 2020-10-08 Guangdong Oppo Mobile Telecommunications Corp., Ltd. User equipment and method for access control through access categorization of same
WO2020220997A1 (en) * 2019-04-28 2020-11-05 华为技术有限公司 Communication method, apparatus and system
CN112351470A (en) * 2019-08-07 2021-02-09 华为技术有限公司 Access restriction detection method and device
CN113596948A (en) * 2020-04-30 2021-11-02 维沃移动通信有限公司 Information reporting method, information sending method, information selecting method and related equipment
CN114039738A (en) * 2020-07-21 2022-02-11 华为技术有限公司 Firewall rule configuration method and system, medium and electronic equipment thereof
CN114760663A (en) * 2020-12-28 2022-07-15 中国移动通信有限公司研究院 Information transmission method, device, related equipment and storage medium

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US11206602B2 (en) * 2019-05-02 2021-12-21 Mediatek Inc. Enhancement for closed access groups

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106572516A (en) * 2016-09-28 2017-04-19 华为技术有限公司 Network slice selection method, terminal equipment and network equipment
CN106851589A (en) * 2016-12-30 2017-06-13 北京小米移动软件有限公司 Wireless network access method, apparatus and system

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2017059829A2 (en) * 2016-11-04 2017-04-13 Telefonaktiebolaget Lm Ericsson (Publ) Methods, base station and user equipment
CN106412905A (en) * 2016-12-12 2017-02-15 中国联合网络通信集团有限公司 Network slice selection method, UE, MME and system

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106572516A (en) * 2016-09-28 2017-04-19 华为技术有限公司 Network slice selection method, terminal equipment and network equipment
CN106851589A (en) * 2016-12-30 2017-06-13 北京小米移动软件有限公司 Wireless network access method, apparatus and system

Non-Patent Citations (3)

* Cited by examiner, † Cited by third party
Title
HUAWEI: "UE Slice Association/Overload control Procedure", 《3GPP TSG SA WG2 MEETING #115,S2-162981》 *
TELECOM ITALIA, CHINA MOBILE, ZTE: "S-NSSAI and Network Slice instances", 《SA WG2 MEETING #121,S2-173207》 *
ZTE: "Clarification on Network Slicing in RAN", 《3GPP TSG RAN WG3 MEETING#93 R3-161596》 *

Cited By (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2020199106A1 (en) * 2019-04-01 2020-10-08 Guangdong Oppo Mobile Telecommunications Corp., Ltd. User equipment and method for access control through access categorization of same
WO2020220997A1 (en) * 2019-04-28 2020-11-05 华为技术有限公司 Communication method, apparatus and system
CN112351470A (en) * 2019-08-07 2021-02-09 华为技术有限公司 Access restriction detection method and device
WO2021023185A1 (en) * 2019-08-07 2021-02-11 华为技术有限公司 Method and device for access restriction detection
CN112351470B (en) * 2019-08-07 2022-04-05 华为技术有限公司 Access restriction detection method and device
CN113596948A (en) * 2020-04-30 2021-11-02 维沃移动通信有限公司 Information reporting method, information sending method, information selecting method and related equipment
CN113596948B (en) * 2020-04-30 2024-01-16 维沃移动通信有限公司 Information reporting method, sending method, selecting method and related equipment
CN114039738A (en) * 2020-07-21 2022-02-11 华为技术有限公司 Firewall rule configuration method and system, medium and electronic equipment thereof
CN114039738B (en) * 2020-07-21 2023-02-03 华为技术有限公司 Firewall rule configuration method and system, medium and electronic equipment thereof
CN114760663A (en) * 2020-12-28 2022-07-15 中国移动通信有限公司研究院 Information transmission method, device, related equipment and storage medium

Also Published As

Publication number Publication date
WO2018228517A1 (en) 2018-12-20
CN109151950B (en) 2021-09-07

Similar Documents

Publication Publication Date Title
CN109151950A (en) A kind of method, the network equipment and the terminal device of access control
US11778493B2 (en) Data collection method, device, and system
US20200374964A1 (en) Communication Method and Apparatus
EP3117586B1 (en) Cross-layer context management
CN110167201A (en) A kind of method, relevant apparatus and the system of data transmission
US20230319601A1 (en) Communication method, apparatus, and system
US20220232445A1 (en) Communications System Switching Method and Terminal Device
CN109217995A (en) A kind of data processing method, terminal and base station
WO2021134496A1 (en) Communication method and apparatus
CN110679194A (en) Data scheduling method and related equipment
CN107608720A (en) Using the display methods of footmark, device, mobile terminal and storage medium
CN114116648A (en) Method, apparatus and computer program product for enhanced data analysis in multiple NWDAF deployments
CN110234172A (en) Method, the method and device of access category creation of a kind of data transmission
CN108811109A (en) Method for mapping resource, the network equipment and terminal device
CN105307139A (en) Method, mobile terminal and system for transmitting application heartbeat signals
CN114189938B (en) Carrier wave determining method, communication device and storage medium
CN106713171A (en) Server and delay-queue-based current-limiting protection system and method
CN107786965B (en) Team game communication method and related product
CN109565826B (en) Data transmission method and related product
CN108432302A (en) Power information sending method, terminal device and the network equipment
CN109462826A (en) A kind of group paging method, user equipment, the network equipment and computer readable storage medium
WO2019214593A9 (en) Communication method and apparatus
CN107820287B (en) Detect the method and Related product of terminal access
WO2023151585A1 (en) Terminal target surface capability reporting and acquiring methods, terminal, and network device
US20220338093A1 (en) Communication method, device, and system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant