CN112153719B - Communication method, device, system and computer readable storage medium - Google Patents

Communication method, device, system and computer readable storage medium Download PDF

Info

Publication number
CN112153719B
CN112153719B CN201910574863.2A CN201910574863A CN112153719B CN 112153719 B CN112153719 B CN 112153719B CN 201910574863 A CN201910574863 A CN 201910574863A CN 112153719 B CN112153719 B CN 112153719B
Authority
CN
China
Prior art keywords
network slice
temporary network
terminal
access
user
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201910574863.2A
Other languages
Chinese (zh)
Other versions
CN112153719A (en
Inventor
朱红梅
林弈琳
何宇锋
刘洁
王庆扬
尹珂
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
China Telecom Corp Ltd
Original Assignee
China Telecom Corp Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by China Telecom Corp Ltd filed Critical China Telecom Corp Ltd
Priority to CN201910574863.2A priority Critical patent/CN112153719B/en
Publication of CN112153719A publication Critical patent/CN112153719A/en
Application granted granted Critical
Publication of CN112153719B publication Critical patent/CN112153719B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W48/00Access restriction; Network selection; Access point selection
    • H04W48/08Access restriction or access information delivery, e.g. discovery data delivery
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W48/00Access restriction; Network selection; Access point selection
    • H04W48/16Discovering, processing access restriction or access information
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W48/00Access restriction; Network selection; Access point selection
    • H04W48/18Selecting a network or a communication service

Abstract

The present disclosure provides a communication method, apparatus, system and computer readable storage medium, relating to the 5G technical field, the method includes: receiving a notification message sent by an AMF entity, wherein the notification message carries an identifier of a 5G terminal entering a jurisdiction area of the AMF entity; issuing an access request of an unsigned temporary network slice to the 5G terminal so that a user can select whether to access the temporary network slice; and responding to the confirmation message of the user selecting to access the temporary network slice, and accessing the temporary network slice for the 5G terminal so that the 5G terminal can communicate by using the temporary network slice.

Description

Communication method, device, system and computer readable storage medium
Technical Field
The present disclosure relates to the field of 5G technologies, and in particular, to a communication method, apparatus, system, and computer-readable storage medium.
Background
With the development of communication technology, the demands of users are more and more diversified. For example, users have different functional requirements, such as priority, charging, policy control, security, mobility, etc. Also for example, users have different performance requirements, such as latency, mobility, reliability, rate, etc. As another example, certain services only serve specific users, such as public safety users, cooperative consumers, roaming users, virtual carriers, and so forth.
In order to solve the problem of diversity of user requirements, 5G network slices are generated.
In the related art, according to the definition of the current 3GPP standard, a network slice used by a user must be signed, otherwise, the network slice cannot be used.
Disclosure of Invention
The inventors have noted that in some cases, such as temporary events like holding a concert, a ball game, etc., each user needs to sign up to use the web slice in order to meet the network usage needs of the users participating in the event. On one hand, the subscription process is complex and tedious, the subscription period is long, and the user does not need to use for a long time after subscription, so that the utilization rate of the subscription service is low; on the other hand, the subscription data of the user needs to be changed frequently, so that the security of the subscription data is reduced.
In order to solve the above problem, the embodiments of the present disclosure provide the following technical solutions.
According to an aspect of the embodiments of the present disclosure, there is provided a communication method, including: receiving a notification message sent by an access and mobile management function (AMF) entity, wherein the notification message carries an identifier of a 5G terminal entering a jurisdiction area of the AMF entity; issuing an access request of an unsigned temporary network slice to the 5G terminal so that a user can select whether to access the temporary network slice; and responding to a confirmation message of the user selecting to access the temporary network slice, and accessing the temporary network slice for the 5G terminal so that the 5G terminal can communicate by using the temporary network slice.
In some embodiments, the method further comprises: determining a bandwidth corresponding to the temporary network slice according to the number of users likely to be in an activity venue during an activity duration and the type of traffic likely to be used by the users in the activity venue during the activity duration, wherein the activity venue is located in the jurisdiction of the AMF entity.
In some embodiments, the method further comprises: and adjusting the bandwidth corresponding to the temporary network slice in real time according to the number of the users actually in the activity venue and the service types actually used by the users within the activity duration.
In some embodiments, the method further comprises: tearing down the temporary network slice if the duration of the temporary network slice exceeds a predetermined time, wherein the start time of the temporary network slice is earlier than the start time of the active duration, and the end time of the temporary network slice is later than the end time of the active duration.
In some embodiments, the method further comprises: and after the 5G terminal is accessed to the temporary network slice, sending the identifier of the temporary network slice to the 5G terminal so that the 5G terminal can display the accessed temporary network slice.
In some embodiments, the access request is carried in a short message.
According to another aspect of the embodiments of the present disclosure, there is provided a communication apparatus including: the system comprises a receiving module, a judging module and a sending module, wherein the receiving module is configured to receive a notification message sent by an access and mobile management function (AMF) entity, and the notification message carries an identifier of a 5G terminal entering a jurisdiction area of the AMF entity; the issuing module is configured to issue an access request of an unsigned temporary network slice to the 5G terminal so that a user can select whether to access the temporary network slice; an access module configured to access the temporary network slice for the 5G terminal in response to a confirmation message that the user selects to access the temporary network slice, so that the 5G terminal communicates using the temporary network slice.
According to still another aspect of the embodiments of the present disclosure, there is provided a communication apparatus including: a memory; and a processor coupled to the memory, the processor configured to perform the method of any of the above embodiments based on instructions stored in the memory.
According to still another aspect of the embodiments of the present disclosure, there is provided a communication system including: the communication device according to any of the above embodiments; the 5G terminal is configured to receive an access request of an unsigned temporary network slice sent by the communication device, respond to the user selection to access the temporary network slice, send a confirmation message to the communication device, and utilize the temporary network slice for communication after accessing the temporary network slice; an access and mobility management function, AMF, entity configured to send a notification message to the communication device, the notification message carrying an identity of the 5G terminal.
According to a further aspect of the embodiments of the present disclosure, there is provided a computer-readable storage medium having stored thereon computer program instructions, which when executed by a processor, implement the method according to any one of the embodiments described above.
In the embodiment of the disclosure, after the user enters the administration area of the AMF entity, an access request of the non-signed temporary network slice is pushed to the user, and then the user accesses the temporary network slice after selecting to access the temporary network slice. The mode can be used without signing a network slice by a user, thereby saving the complex signing flow and being more convenient for the user to use. In addition, the user subscription data does not need to be changed frequently, and the security of the user subscription data is improved.
The technical solution of the present disclosure is further described in detail by the accompanying drawings and examples.
Drawings
In order to more clearly illustrate the embodiments of the present disclosure or the technical solutions in the prior art, the drawings used in the description of the embodiments or the prior art will be briefly described below, it is obvious that the drawings in the following description are only some embodiments of the present disclosure, and other drawings can be obtained by those skilled in the art without creative efforts.
Fig. 1 is a flow diagram of a communication method according to some embodiments of the present disclosure;
fig. 2 is a schematic structural diagram of a communication device according to some embodiments of the present disclosure;
FIG. 3 is a schematic block diagram of a communication device according to further embodiments of the present disclosure;
fig. 4 is a schematic block diagram of a communication system according to further embodiments of the present disclosure.
Detailed Description
The technical solutions in the embodiments of the present disclosure will be clearly and completely described below with reference to the drawings in the embodiments of the present disclosure, and it is obvious that the described embodiments are only a part of the embodiments of the present disclosure, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments disclosed herein without making any creative effort, shall fall within the protection scope of the present disclosure.
The relative arrangement of the components and steps, the numerical expressions, and numerical values set forth in these embodiments do not limit the scope of the present disclosure unless specifically stated otherwise.
Meanwhile, it should be understood that the sizes of the respective portions shown in the drawings are not drawn in an actual proportional relationship for the convenience of description.
Techniques, methods, and apparatus known to those of ordinary skill in the relevant art may not be discussed in detail but are intended to be part of the specification where appropriate.
In all examples shown and discussed herein, any particular value should be construed as merely illustrative, and not limiting. Thus, other examples of the exemplary embodiments may have different values.
It should be noted that: like reference numbers and letters refer to like items in the following figures, and thus, once an item is defined in one figure, further discussion thereof is not required in subsequent figures.
Fig. 1 is a flow diagram of a communication method according to some embodiments of the present disclosure. The communication method may be performed by a communication apparatus described later. The communication means may be provided in, for example, an IT system or a customer relationship management system (CRM).
In step 102, a notification message sent by an access and mobility management function (AMF) entity is received. Here, the notification message carries an identification of the 5G terminal entering the jurisdiction of the AMF entity, such as a cell phone number.
In step 104, an access request of the non-signed temporary network slice is issued to the 5G terminal, so that the user can select whether to access the temporary network slice.
For example, the communication device may negotiate with the AMF entity in advance, and after a certain 5G terminal enters the jurisdiction area of the AMF entity, the AMF entity sends the identifier of the 5G terminal to the communication device, and the communication device issues an access request to the 5G terminal.
Here, certain resources may be pre-virtualized from network resources for use by the temporary network slice, depending on the particular activity to be held.
In some embodiments, the access request issued to the 5G terminal may be carried in a short message. For example, a short message can be sent to the 5G terminal, and the short message carries the link. The user may appear a web page, or two-dimensional code, after clicking on the link. And selecting the access temporary network slice according to the prompt of the webpage. Or, the corresponding program can be entered by identifying the two-dimensional code, and then the access temporary network slice is selected.
For example, the user may be considered to select to access the temporary network slice after the payment is successful.
In step 106, in response to the confirmation message that the user selects to access the temporary network slice, the 5G terminal is accessed to the temporary network slice so that the 5G terminal can communicate by using the temporary network slice.
For example, after the user successfully pays, the 5G terminal may send a confirmation message.
In some embodiments, after accessing the temporary network slice for the 5G terminal, an identification of the temporary network slice may be sent to the 5G terminal so that the 5G terminal displays the accessed temporary network slice. In this way, the user can intuitively know whether the temporary network slice is successfully accessed.
In the above embodiment, after the user enters the administration area of the AMF entity, the access request of the non-signed temporary network slice is pushed to the user, and then the user accesses the temporary network slice after selecting to access the temporary network slice. The mode can be used without signing a network slice by a user, thereby saving the complex signing flow and being more convenient for the user to use. In addition, the user subscription data does not need to be changed frequently, and the security of the user subscription data is improved.
In some embodiments, the bandwidth corresponding to the temporary network slice may be determined based on the number of users likely to be in the activity venue for the duration of the activity and the type of traffic likely to be used by the users in the activity venue for the duration of the activity. Here, the activity venue is located within the jurisdiction of the AMF entity.
For example, an event venue could be a venue with a total of 2 million people. A singer starts a concert from 7 to 9 o' clock a day later. The number of users likely to be in the activity venue may be estimated based on the total number of users accommodated by the activity venue and the ratio of the total number of users at the location to the total number of people at the location by the operator. For example, if the ratio of the total number of users at the location to the total number of people at the location is 1:2, the ratio of the number of users likely to be in the activity venue to the total number of people accommodated in the activity venue is also 1:2, i.e., the number of users likely to be in the activity venue is 1 ten thousand. For a concert, the types of services that a user may use may include: uploading a concert video clip, making a call, real-time video call, etc. in real time.
In order to ensure that the temporary network slice can meet the use requirement, during the activity period, the bandwidth corresponding to the temporary network slice can be adjusted in real time according to the number of users actually in the activity venue and the service type actually used by the users in the activity duration.
For example, the number of users actually in the activity venue is greater than the previously estimated number of users likely to be in the activity venue, and/or the type of service actually used by the user requires more traffic than the previously estimated type of service. In this case, the bandwidth corresponding to the temporary network slice may be increased.
As another example, the number of users actually in the activity venue may be less than the previously estimated number of users likely to be in the activity venue, and/or the type of service actually used by the user may require less traffic than the previously estimated type of service. In this case, the bandwidth corresponding to the temporary network slice can be reduced.
In some embodiments, to avoid wasting resources of the temporary network slice, the temporary network slice may be torn down and network resources released in time in case the duration of the temporary network slice exceeds a predetermined time. In some implementations, the start time of the temporary network slice may be earlier than the start time of the activity duration and the end time of the temporary network slice may be later than the end time of the activity duration to ensure the network experience of the user in referring to the activity. For example, the activity duration may be 7 to 9 points later, and the duration of the temporary network slice may be 6 to 9 and a half later.
For example, a timer may be started after instantiating the temporary network slice. In the event that the timer times out, the temporary network slice may be torn down.
In the present specification, the embodiments are described in a progressive manner, each embodiment focuses on differences from other embodiments, and the same or similar parts in the embodiments are referred to each other. For the device embodiment, since it basically corresponds to the method embodiment, the description is relatively simple, and for the relevant points, reference may be made to the partial description of the method embodiment.
Fig. 2 is a schematic structural diagram of a communication device according to some embodiments of the present disclosure.
As shown in fig. 2, the communication apparatus of this embodiment includes a receiving module 201, a distributing module 202, and an accessing module 203.
The receiving module 201 is configured to receive a notification message sent by an access and mobility management function, AMF, entity, where the notification message carries an identifier of a 5G terminal entering a jurisdiction of the AMF entity.
The issuing module 202 is configured to issue an access request of the non-signed temporary network slice to the 5G terminal, so that the user selects whether to access the temporary network slice.
The access module 203 is configured to access the temporary network slice for the 5G terminal in response to the acknowledgement message that the user selects to access the temporary network slice, so that the 5G terminal communicates using the temporary network slice.
In the above embodiment, after the user enters the administration area of the AMF entity, the access request of the non-signed temporary network slice is pushed to the user, and then the user accesses the temporary network slice after selecting to access the temporary network slice. The mode can be used without signing a network slice by a user, so that a complex signing process is saved, and the user can use the method more conveniently. In addition, the user subscription data does not need to be changed frequently, and the security of the user subscription data is improved.
Fig. 3 is a schematic block diagram of a communication device according to further embodiments of the present disclosure.
As shown in fig. 3, the communication device 300 of this embodiment includes a memory 301 and a processor 302 coupled to the memory 301, and the processor 302 is configured to execute the method of any one of the foregoing embodiments based on instructions stored in the memory 301.
The memory 301 may include, for example, system memory, fixed non-volatile storage media, and the like. The system memory may store, for example, an operating system, application programs, a Boot Loader (Boot Loader), and other programs.
The communication apparatus 300 may further include an input-output interface 303, a network interface 304, a storage interface 305, and the like. The interfaces 303, 304, 305 and the memory 301 and the processor 302 may be connected by a bus 306, for example. The input/output interface 303 provides a connection interface for input/output devices such as a display, a mouse, a keyboard, and a touch screen. The network interface 304 provides a connection interface for various networking devices. The storage interface 305 provides a connection interface for external storage devices such as an SD card and a usb disk.
Fig. 4 is a schematic block diagram of a communication system according to some embodiments of the present disclosure.
As shown in fig. 4, the communication system may include the communication apparatus 401, one or more 5G terminals 402, and the AMF entity 403 of any of the above embodiments.
The 5G terminal 402 is configured to receive an access request issued by the communication apparatus 401 for an unsubscribed temporary network slice, send a confirmation message to the communication apparatus 401 in response to a user selecting to access the temporary network slice, and perform communication using the temporary network slice after accessing the temporary network slice.
The AMF entity 403 is configured to send a notification message to the communication device 401, the notification message carrying the identity of the 5G terminal 402.
The disclosed embodiments also provide a computer-readable storage medium having stored thereon computer program instructions, which when executed by a processor, implement the method of any of the above embodiments.
Thus, various embodiments of the present disclosure have been described in detail. Some details that are well known in the art have not been described in order to avoid obscuring the concepts of the present disclosure. It will be fully apparent to those skilled in the art from the foregoing description how to practice the presently disclosed embodiments.
As will be appreciated by one skilled in the art, embodiments of the present disclosure may be provided as a method, system, or computer program product. Accordingly, the present disclosure may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects. Furthermore, the present disclosure may take the form of a computer program product embodied on one or more computer-usable non-transitory storage media (including, but not limited to, disk storage, CD-ROM, optical storage, and the like) having computer-usable program code embodied therein.
The present disclosure is described with reference to flowchart illustrations and/or block diagrams of methods, apparatus (systems), and computer program products according to embodiments of the disclosure. It will be understood that the functions specified in one or more of the flows in the flowcharts and/or one or more of the blocks in the block diagrams can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, embedded processor, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable data processing apparatus to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including instruction means which implement the function specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be loaded onto a computer or other programmable data processing apparatus to cause a series of operational steps to be performed on the computer or other programmable apparatus to produce a computer implemented process such that the instructions which execute on the computer or other programmable apparatus provide steps for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
Although some specific embodiments of the present disclosure have been described in detail by way of example, it should be understood by those skilled in the art that the foregoing examples are for purposes of illustration only and are not intended to limit the scope of the present disclosure. It will be understood by those skilled in the art that various changes may be made in the above embodiments or equivalents may be substituted for elements thereof without departing from the scope and spirit of the present disclosure. The scope of the present disclosure is defined by the appended claims.

Claims (10)

1. A method of communication, comprising:
receiving a notification message sent by an access and mobile management function (AMF) entity, wherein the notification message carries an identifier of a 5G terminal entering a jurisdiction area of the AMF entity;
issuing an access request of an unsigned temporary network slice to the 5G terminal so that a user can select whether to access the temporary network slice;
and responding to the confirmation message of the user selecting to access the temporary network slice, and accessing the temporary network slice for the 5G terminal so that the 5G terminal can communicate by using the temporary network slice.
2. The method of claim 1, further comprising:
determining a bandwidth corresponding to the temporary network slice according to the number of users likely to be in an activity venue during an activity duration and the type of traffic likely to be used by the users in the activity venue during the activity duration, wherein the activity venue is located in the jurisdiction of the AMF entity.
3. The method of claim 2, further comprising:
and adjusting the bandwidth corresponding to the temporary network slice in real time according to the number of the users actually in the activity venue and the service types actually used by the users within the activity duration.
4. The method of claim 2, further comprising:
tearing down the temporary network slice if the duration of the temporary network slice exceeds a predetermined time, wherein the start time of the temporary network slice is earlier than the start time of the active duration, and the end time of the temporary network slice is later than the end time of the active duration.
5. The method of claim 1, further comprising:
and after the 5G terminal is accessed to the temporary network slice, sending the identifier of the temporary network slice to the 5G terminal so that the 5G terminal can display the accessed temporary network slice.
6. The method of any of claims 1-5, wherein the access request is carried in a short message.
7. A communication device, comprising:
the system comprises a receiving module, a judging module and a sending module, wherein the receiving module is configured to receive a notification message sent by an access and mobile management function (AMF) entity, and the notification message carries an identifier of a 5G terminal entering a jurisdiction area of the AMF entity;
the issuing module is configured to issue an access request of an unsigned temporary network slice to the 5G terminal so that a user can select whether to access the temporary network slice;
an access module configured to access the temporary network slice for the 5G terminal in response to a confirmation message that the user selects to access the temporary network slice, so that the 5G terminal communicates using the temporary network slice.
8. A communication device, comprising:
a memory; and
a processor coupled to the memory, the processor configured to perform the method of any of claims 1-6 based on instructions stored in the memory.
9. A communication system, comprising:
the communication device of claim 7 or 8;
the 5G terminal is configured to receive an access request of an unsigned temporary network slice sent by the communication device, respond to the user selection to access the temporary network slice, send a confirmation message to the communication device, and utilize the temporary network slice for communication after accessing the temporary network slice;
an access and mobility management function, AMF, entity configured to send a notification message to the communication device, the notification message carrying an identity of the 5G terminal.
10. A computer readable storage medium having computer program instructions stored thereon, wherein the instructions, when executed by a processor, implement the method of any of claims 1-6.
CN201910574863.2A 2019-06-28 2019-06-28 Communication method, device, system and computer readable storage medium Active CN112153719B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910574863.2A CN112153719B (en) 2019-06-28 2019-06-28 Communication method, device, system and computer readable storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910574863.2A CN112153719B (en) 2019-06-28 2019-06-28 Communication method, device, system and computer readable storage medium

Publications (2)

Publication Number Publication Date
CN112153719A CN112153719A (en) 2020-12-29
CN112153719B true CN112153719B (en) 2022-08-02

Family

ID=73869342

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910574863.2A Active CN112153719B (en) 2019-06-28 2019-06-28 Communication method, device, system and computer readable storage medium

Country Status (1)

Country Link
CN (1) CN112153719B (en)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
AU2021460868A1 (en) * 2021-08-20 2024-03-21 Nokia Technologies Oy Providing temporary network slice services in a communication system
CN114268949A (en) * 2021-11-16 2022-04-01 浙江大学 Network building method of 5G local area network

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106375987A (en) * 2015-07-22 2017-02-01 中兴通讯股份有限公司 Method and system for selecting network slice
CN106572516A (en) * 2016-09-28 2017-04-19 华为技术有限公司 Network slice selection method, terminal equipment and network equipment
CN106657194A (en) * 2015-11-02 2017-05-10 中兴通讯股份有限公司 Network slice capability opening method, device and system
WO2019073977A1 (en) * 2017-10-11 2019-04-18 Nec Corporation Ue configuration and update with network slice selection policy
CN109768875A (en) * 2017-11-10 2019-05-17 华为技术有限公司 Policy management method, device, equipment and the system of network slice
CN109891943A (en) * 2017-11-03 2019-06-14 Oppo广东移动通信有限公司 A kind of method, equipment and the computer-readable medium of access control

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US10867642B2 (en) * 2016-05-17 2020-12-15 Taiwan Semiconductor Manufacturing Company Limited Active random access memory

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106375987A (en) * 2015-07-22 2017-02-01 中兴通讯股份有限公司 Method and system for selecting network slice
CN106657194A (en) * 2015-11-02 2017-05-10 中兴通讯股份有限公司 Network slice capability opening method, device and system
CN106572516A (en) * 2016-09-28 2017-04-19 华为技术有限公司 Network slice selection method, terminal equipment and network equipment
WO2019073977A1 (en) * 2017-10-11 2019-04-18 Nec Corporation Ue configuration and update with network slice selection policy
CN109891943A (en) * 2017-11-03 2019-06-14 Oppo广东移动通信有限公司 A kind of method, equipment and the computer-readable medium of access control
CN109768875A (en) * 2017-11-10 2019-05-17 华为技术有限公司 Policy management method, device, equipment and the system of network slice

Also Published As

Publication number Publication date
CN112153719A (en) 2020-12-29

Similar Documents

Publication Publication Date Title
US10936371B2 (en) Method for resource allocation and related products
CN109246741B (en) Wireless network connection method for terminal
CN113535343B (en) Computing power sharing method based on network scheduling and related product
CN104809589A (en) Order processing method and device
CN104753911A (en) Information processing method based on communication & social application, relevant device and system
CN112153719B (en) Communication method, device, system and computer readable storage medium
CN108391021B (en) Queuing service management method, device, system and storage medium
WO2022148254A1 (en) User information analysis result feedback method and device thereof
CN105786839A (en) Application data acquisition method and apparatus
CN106843794B (en) Split screen display method and system based on android
CN104424028A (en) Terminal device and switching method thereof
CN108829519A (en) Method for scheduling task, cloud platform and computer readable storage medium based on cloud platform
CN106569917A (en) Data backup method and mobile terminal
CN107197493B (en) A kind of method for switching network, network switching device and intelligent terminal
CN111680993A (en) Data processing method and device, computer and readable storage medium
CN111132132A (en) Traffic management method and device and terminal equipment
WO2017219587A1 (en) Master-slave device switching method, slave device, management server, and storage medium
CN109818759B (en) Data display-based traffic sharing method and device and computer equipment
CN106851595B (en) Ordered broadcast processing method, device and terminal device
CN112929254A (en) Message processing method and device and electronic equipment
CN108632069B (en) Client configuration method, system and related equipment
CN106793173B (en) The method and mobile terminal of information processing
CN114006782B (en) Group message distribution method and device
CN109963260A (en) A kind of method and device that determining business terminates
CN111479137B (en) Method and device for providing line address, server and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant