CN112655182A - Communication method and apparatus - Google Patents

Communication method and apparatus Download PDF

Info

Publication number
CN112655182A
CN112655182A CN201880097268.8A CN201880097268A CN112655182A CN 112655182 A CN112655182 A CN 112655182A CN 201880097268 A CN201880097268 A CN 201880097268A CN 112655182 A CN112655182 A CN 112655182A
Authority
CN
China
Prior art keywords
network
terminal device
identifier
core network
terminal
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201880097268.8A
Other languages
Chinese (zh)
Other versions
CN112655182B (en
Inventor
刘建华
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guangdong Oppo Mobile Telecommunications Corp Ltd
Original Assignee
Guangdong Oppo Mobile Telecommunications Corp Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guangdong Oppo Mobile Telecommunications Corp Ltd filed Critical Guangdong Oppo Mobile Telecommunications Corp Ltd
Publication of CN112655182A publication Critical patent/CN112655182A/en
Application granted granted Critical
Publication of CN112655182B publication Critical patent/CN112655182B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/40Network security protocols

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The embodiment of the application relates to a communication method and equipment, wherein the method comprises the following steps: a terminal device acquires a first identifier accessed to a first network, wherein the first network is a non-public core network deployed by an operator, and the terminal device has a subscription with a Public Land Mobile Network (PLMN); the terminal equipment accesses the first network based on the first identification. The communication method and the communication device in the embodiment of the application can enable the terminal device which has a subscription with the PLMN to access the TAN.

Description

Communication method and apparatus Technical Field
The present application relates to the field of communications, and in particular, to a communication method and device.
Background
A New Radio (NR) system (or referred to as a 5G system, a 5G network) introduces a non-public core network deployed by an operator.
In general, the terminal device moves continuously. When a terminal device of a Public Land Mobile Network (PLMN) enters a coverage area of a non-Public core Network deployed by an operator, there is no clear specification for how to access the terminal device subscribed to the PLMN to the non-Public core Network deployed by the operator.
Disclosure of Invention
The embodiment of the application provides a communication method and device, which can enable terminal devices signed with PLMN to access a non-public core network deployed by an operator.
In a first aspect, a communication method is provided, the method including: a terminal device acquires a first identifier accessed to a first network, wherein the first network is a non-public core network deployed by an operator, and the terminal device has a subscription with a Public Land Mobile Network (PLMN);
and the terminal equipment accesses the first network based on the first identifier.
In a second aspect, a communication method is provided, the method comprising: the method comprises the steps that core network equipment receives a second request message sent by terminal equipment, wherein the second request message comprises a first identifier of the terminal equipment accessing a first network and an identifier of the terminal equipment, the first network is a non-public core network deployed by an operator, and the terminal equipment is signed with a Public Land Mobile Network (PLMN);
and the core network equipment sends a second request response message to the terminal equipment, wherein the second request response message is used for indicating whether the terminal equipment is allowed to access the first network or not.
In a third aspect, a communication method is provided, the method including: a first device receives a first request message sent by a terminal device, wherein the first request message is used for requesting to access a first identifier of a first network, the first network is a non-public core network deployed by an operator, and the terminal device has a subscription relationship with a Public Land Mobile Network (PLMN);
and the first equipment sends a first request response message to the terminal equipment, wherein the first request response message comprises the first identifier.
In a fourth aspect, a terminal device is provided, configured to perform the method in the first aspect or each implementation manner thereof.
Specifically, the terminal device includes a functional module for executing the method in the first aspect or each implementation manner thereof.
In a fifth aspect, a core network device is provided, which is configured to execute the method in the second aspect or each implementation manner thereof.
Specifically, the core network device includes a functional module configured to execute the method in the second aspect or each implementation manner thereof.
In a sixth aspect, a communication device is provided for performing the method of the third aspect or its implementations.
In particular, the communication device comprises functional modules for performing the method of the third aspect or its implementations.
In a seventh aspect, a terminal device is provided that includes a processor and a memory. The memory is used for storing a computer program, and the processor is used for calling and running the computer program stored in the memory, and executing the method in the first aspect or each implementation manner thereof.
In an eighth aspect, a core network device is provided that includes a processor and a memory. The memory is used for storing a computer program, and the processor is used for calling and running the computer program stored in the memory, and executing the method of the second aspect or each implementation mode thereof.
In a ninth aspect, a communication device is provided that includes a processor and a memory. The memory is used for storing a computer program, and the processor is used for calling and running the computer program stored in the memory, and executing the method in the third aspect or each implementation manner thereof.
A tenth aspect provides a chip for implementing the method of any one of the first to third aspects or implementations thereof.
Specifically, the chip includes: a processor configured to call and run the computer program from the memory, so that the device on which the chip is installed performs the method according to any one of the first to third aspects or the implementation manners thereof.
In an eleventh aspect, a computer-readable storage medium is provided for storing a computer program, which causes a computer to perform the method of any one of the first to third aspects or implementations thereof.
In a twelfth aspect, there is provided a computer program product comprising computer program instructions to cause a computer to perform the method of any of the first to third aspects or implementations thereof.
In a thirteenth aspect, there is provided a computer program which, when run on a computer, causes the computer to perform the method of any one of the above first to third aspects or implementations thereof.
According to the technical scheme, when the terminal equipment signed with the PLMN enters the non-public core network deployed by the operator, the terminal equipment can obtain the identifier of the non-public core network deployed by the access operator, so that the non-public core network deployed by the operator can be accessed based on the obtained identifier.
Drawings
Fig. 1 is a schematic diagram of a communication system architecture provided in an embodiment of the present application.
Fig. 2 is a schematic flow chart of a communication method provided in an embodiment of the present application.
Fig. 3 is a schematic flow chart of another communication method provided in the embodiment of the present application.
Fig. 4 is a schematic flow chart of another communication method provided in the embodiment of the present application.
Fig. 5 is a specific schematic interaction diagram of a communication method provided in an embodiment of the present application.
Fig. 6 is a schematic block diagram of a terminal device according to an embodiment of the present application.
Fig. 7 is a schematic block diagram of a core network device according to an embodiment of the present application.
Fig. 8 is a schematic block diagram of a communication device according to an embodiment of the present application.
Fig. 9 is a schematic block diagram of a communication device according to an embodiment of the present application.
FIG. 10 is a schematic block diagram of a chip according to an embodiment of the present application.
Fig. 11 is a schematic block diagram of a communication system according to an embodiment of the present application.
Detailed Description
Technical solutions in the embodiments of the present application will be described below with reference to the drawings in the embodiments of the present application, and it is obvious that the described embodiments are some embodiments of the present application, but not all embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present application.
The technical scheme of the embodiment of the application can be applied to various communication systems, for example: a Global System for Mobile communications (GSM) System, a Code Division Multiple Access (CDMA) System, a Wideband Code Division Multiple Access (WCDMA) System, a General Packet Radio Service (GPRS), a Long Term Evolution (Long Term Evolution, LTE) System, an LTE Frequency Division Duplex (FDD) System, an LTE Time Division Duplex (TDD), a Universal Mobile Telecommunications System (UMTS), a Worldwide Interoperability for Microwave Access (WiMAX) communication System, a 5G System, or a later-version communication System.
Fig. 1 illustrates a wireless communication system 100 to which an embodiment of the present application is applied. The wireless communication system 100 may include an access network device 110. Access network device 110 may be a device that communicates with terminal devices. Access network device 110 may provide communication coverage for a particular geographic area and may communicate with terminal devices located within the coverage area. Alternatively, the Access Network device 110 may be a Next Generation Radio Access Network (NG RAN), or a base station (gNB) in an NR system, or a wireless controller in a Cloud Radio Access Network (CRAN), or the Access Network device 110 may be a Mobile switching center, a relay station, an Access point, a vehicle-mounted device, a wearable device, a hub, a switch, a bridge, a router, a Network side device in a 5G Network, or a Network device in a Public Land Mobile Network (PLMN) for future evolution, and the like. Optionally, the Access Network device 110 may also be a base station in an LTE system, for example, an Evolved Universal Radio Access Network (E-UTRAN) device.
The wireless communication system 100 also includes at least one terminal device 120 located within the coverage area of the access network device 110. The terminal device 120 may be mobile or stationary. Optionally, "end devices" as used herein include, but are not limited to, connections via wireline, such as Public Switched Telephone Network (PSTN), Digital Subscriber Line (DSL), Digital cable, direct cable connection; and/or another data connection/network; and/or via a Wireless interface, e.g., to a cellular Network, a Wireless Local Area Network (WLAN), a digital television Network such as a DVB-H Network, a satellite Network, an AM-FM broadcast transmitter; and/or means of another terminal device arranged to receive/transmit communication signals; and/or Internet of Things (IoT) devices. A terminal device arranged to communicate over a wireless interface may be referred to as a "wireless communication terminal", "wireless terminal", or "mobile terminal". Examples of mobile terminals include, but are not limited to, satellite or cellular telephones; personal Communications Systems (PCS) terminals that may combine cellular radiotelephones with data processing, facsimile, and data Communications capabilities; PDAs that may include radiotelephones, pagers, internet/intranet access, Web browsers, notepads, calendars, BeiDou Navigation Satellite systems (BDS), and Global Positioning System (GPS) receivers; and conventional laptop and/or palmtop receivers or other electronic devices that include a radiotelephone transceiver. Terminal Equipment may refer to an access terminal, User Equipment (UE), subscriber unit, subscriber station, mobile station, remote terminal, mobile device, User terminal, wireless communication device, User agent, or User Equipment. An access terminal may be a cellular telephone, a cordless telephone, a Session Initiation Protocol (SIP) phone, a Wireless Local Loop (WLL) station, a Personal Digital Assistant (PDA), a handheld device having Wireless communication capabilities, a computing device or other processing device connected to a Wireless modem, a vehicle mounted device, a wearable device, a terminal device in a 5G network, or a terminal device in a future evolved PLMN, etc.
The wireless communication system 100 also includes a core network device 130 in communication with the access network device. Alternatively, the core network device 130 may be a 5G core network device, for example, an Access and Mobility Management Function (AMF), which is responsible for Access and Mobility Management and has functions of authenticating, switching, updating location, and the like for a user. Also for example, the Session Management Function (SMF) is responsible for Session Management, including establishment, modification, release, and the like of a Packet Data Unit (PDU) Session. For another example, a User Plane Function (UPF) is responsible for forwarding User data.
Optionally, terminal-to-Device (D2D) communication may be performed between terminal devices.
Fig. 1 exemplarily shows one access network device, one core network device, and two terminal devices, and optionally, the wireless communication system 100 may include a plurality of access network devices and may include other numbers of terminal devices within the coverage area of each access network device, which is not limited in this embodiment of the present application.
Optionally, the wireless communication system 100 may further include a Mobile Management Entity (MME), a Unified Data Management (UDM), an Authentication Server Function (AUSF), an UPF, a Signaling Gateway (SGW), and other network entities, which is not limited in this embodiment of the present invention. Fig. 1 exemplarily shows one network device and two terminal devices, and optionally, the communication system 100 may include a plurality of network devices and may include other numbers of terminal devices within the coverage of each network device, which is not limited in this embodiment of the present application.
Fig. 2 is a schematic flow chart of a communication method 200 according to an embodiment of the present application, wherein the method may be performed by a terminal device. The method 200 includes at least some of the following.
In 210, the terminal device obtains a first identity for accessing a first network.
The first network is a non-public core network deployed by an operator, and the terminal device has a subscription with a PLMN.
In 220, the terminal device accesses the first network based on the first identity.
Fig. 3 is a schematic flow chart diagram of a communication method 300 according to an embodiment of the present application, where the method may be performed by a core network device. The method 300 includes at least some of the following.
In 310, the core network device receives the second request message sent by the terminal device.
The second request message may include a first identifier of the terminal device accessing the first network and an identifier of the terminal device, where the first network is a non-public core network deployed by an operator, and the terminal device has a subscription with a PLMN.
In 320, the core network device sends a second request response message to the terminal device. And the second request response message is used for indicating whether the terminal equipment is allowed to access the first network or not.
Fig. 4 is a schematic flow chart diagram of a communication method 400 according to an embodiment of the present application, wherein the method may be performed by a first device. The method 400 includes at least some of the following.
In 410, a first device receives a first request message sent by a terminal device.
The first request message is used for requesting access to a first identifier of a first network, the first network is a non-public core network deployed by an operator, and the terminal device has a subscription with a PLMN.
In 420, the first device sends a first request response message to the terminal device, the first request response message including the first identity.
The communication method of the embodiment of the present application will be further described below with reference to fig. 2 to 4. It is to be understood that what is described below applies to both method 200 and methods 300 and 400.
Optionally, in this embodiment of the present application, the first Network may be, for example, a Type-a Network (TAN).
The NR system introduces Vertical Local Access Network (VLAN). VLAN networks, which may also be referred to as non-public networks, provide non-public services. The VLAN Network may be a TAN and a Type-b Network (TBN), where the TAN may access a PLMN to provide PLMN services for UEs accessing the TAN, and the TBN does not access the PLMN and cannot provide PLMN services for UEs accessing the TBN. When the TAN performs data transmission, the TAN may transmit data to an external network, or may perform data transmission only inside the TAN. However, when the TBN performs data transmission, the data transmission can be performed only inside the TBN, and there is no connection with the outside. The UPF of the TAN may be connected to a Data Network (DN) external to the PLMN Network via an interface N6. However, the UPF of the TBN is not connected to a DN outside the PLMN network.
In the examples of the present application, the names of TAN and TBN are not limited, that is, they may be expressed by other names.
Optionally, the first identifier is an ID that can access the first network. For example, the first identification may be a verification code. One terminal device may correspond to at least one first identifier, and one first identifier may also correspond to at least one terminal device.
There are various ways for the terminal device to obtain the first identifier accessing the first network, which is not specifically limited in this embodiment of the application.
In one implementation manner, the acquiring, by the terminal device, the first identifier for accessing the first network may include: the terminal device sends a first request message to the first device, wherein the first request message may be used to request the first identity, and the request message may include the identity of the terminal device. After receiving the first request message, the first device may assign a first identifier to the terminal device. Thereafter, the first device may send a first request response message to the terminal device, the first request response message including the first identity. After the terminal device receives the first request response message, the terminal device may determine the first identity based on the first request response message.
Optionally, the Identity of the terminal device may include, but is not limited to, an International Mobile Subscriber Identity (IMSI), a UE ID, and an International Mobile Equipment Identity (IMEI). When the terminal device is a mobile phone, the identifier of the terminal device may also be a mobile phone number of the terminal device.
Alternatively, the first device may be a core network device, an application server, or a user equipment.
Optionally, after receiving the first request message, the first device may further determine a valid duration of the first identifier. For example, the validity period of the first flag is 30 s. At this time, the first request response message may include the valid duration of the first identifier.
Optionally, after the first device allocates the first identifier to the terminal device, the first device may store the correspondence between the identifier of the terminal device reported by the terminal device and the first identifier.
In another implementation manner, when the first device is an application server, the terminal device may obtain the first identifier through interaction inside the application.
As an example, the terminal device may apply for the first identifier on an application program, that is, the terminal device may send a data packet to the application server, and after the application server assigns the first identifier to the terminal device, the first identifier may be transmitted to the terminal device through the data packet.
In another implementation manner, the terminal device may obtain the first identifier through communication between the user devices.
For example, when the first identifier is the verification code, the first user equipment may notify the second user equipment of the verification code, and the second user equipment inputs the verification code into the terminal equipment after obtaining the verification code, so that the terminal equipment may obtain the verification code.
Optionally, the method according to the embodiment of the present application may further include: the terminal device receives a broadcast message sent by an access network device of the first network, wherein the broadcast message may include an identification of the first network.
Optionally, the broadcast message may further include indication information that allows the terminal device having the subscription with the PLMN to access the first network.
After reading the identifier of the first network, the terminal device compares the identifier with the stored identifier of the first network, and if the read identifier of the first network is the same as the stored identifier of the first network, the terminal device may determine that the current position is covered by the first network, and then the terminal device may initiate registration with the first network. For convenience of description, the following description refers to the identity of the first network held by the terminal device as the identity 1 of the first network.
Optionally, the identity 1 of the first network may be obtained by the first identity, that is, the identity 1 of the first network may be included in the first identity.
Alternatively, the identity 1 of the first network may be pre-configured on the terminal device.
Alternatively, the identifier 1 of the first network may be obtained by the terminal device from an application.
After the terminal device establishes a connection with an access network device of the first network, if the first identifier is within the valid duration, the terminal device may send a second request message to the core network device, where the second request message may include the first identifier and the identifier of the terminal device. After receiving the second request message, the core network device may determine whether to allow the terminal device to access the first network. After that, the core network device may send a second request response message to the terminal device, where the second request response message is used to indicate whether the terminal device is allowed to access the first network.
If the second request response message indicates that the terminal device is allowed to access the first network, the terminal device may access the first network.
It should be understood that the core network device in this embodiment is a core network device of the first network.
Optionally, the second request message may be a registration request message, or may be a Non-Access Stratum (NAS) message carrying a session establishment request message.
In a possible embodiment, the determining, by the core network device, whether to allow the terminal device to access the first network may include: and the core network equipment determines whether the terminal equipment is allowed to access the first network or not according to the first identifier and the identifier of the terminal equipment.
Specifically, the core network device may determine whether the terminal device has a subscription with the PLMN. If the terminal device has a subscription with the PLMN, the core network device may send a check request message to the first device, where the check request message may include the first terminal device identifier and the first identifier. The first device verifies the terminal device based on the first terminal device identifier and the first identifier, and after obtaining a verification result, may send a verification response message to the core network device, where the verification response message includes the verification result. The core network device may then determine whether to allow the terminal device to access the first network based on the result of the check.
The core network device determining whether the terminal device has a subscription with the PLMN may include, as an example: the terminal device sends first indication information to the core network device, where the first indication information may be used to indicate that the terminal device has a subscription with a PLMN. The core network device may determine that the terminal device has a subscription with the PLMN according to the first indication information.
Optionally, the first indication information may be carried in the second request message.
Optionally, the first indication information may indicate whether the terminal device has a subscription with the PLMN by at least one bit.
For example, the first indication information may indicate that the terminal device has no subscription with the PLMN through a bit "0", and indicate that the terminal device has subscription with the PLMN through a bit "1".
Further illustratively, the number of bits of the first indication information may be multiple, and if the multiple bits are the same, it indicates that the terminal device has a subscription with the PLMN, and if at least two bits of the multiple bits are different, it indicates that the terminal device has no subscription with the PLMN. For example, "000" indicates that the terminal device has a subscription with the PLMN, and "010" indicates that the terminal device has no subscription with the PLMN.
It should be understood that the specific examples in the embodiments of the present application are for the purpose of promoting a better understanding of the embodiments of the invention, and are not intended to limit the scope of the embodiments of the present application.
Optionally, the first indication information may indicate whether the terminal device has a subscription with the PLMN through the first parameter.
Exemplarily, if the first indication information includes the first parameter, it indicates that the terminal device has a subscription with the PLMN; and if the first indication information does not comprise the first parameter, indicating that the terminal equipment is not signed with the PLMN.
It should be noted that, in the embodiment of the present application, the first parameter is not specifically limited, and any parameter that can indicate whether the terminal device has a subscription with a PLMN is included in the protection scope of the present application.
Alternatively, the first indication information may be identification information of the terminal device. That is, the core network device may determine whether the terminal device has a subscription with the PLMN by identifying the identifier of the terminal device.
In a possible embodiment, the verifying, by the first device, the terminal device based on the first terminal device identifier and the first identifier may include: the first device stores a second identifier and an identifier of the terminal device, wherein the second identifier is an identifier of the terminal device accessing the first network. Then, the first device may determine whether the included second identifier and the identifier of the terminal device are consistent with the identifier of the first terminal device and the first identifier reported by the core network device. If the network access request is consistent with the network access request, the first device can allow the terminal device to access the first network; and if the network access request is inconsistent with the network access request, the first equipment does not allow the terminal equipment to access the first network.
For example, if the second identifier stored in the first device is ID 1, the identifier of the terminal device is ID 2, the ID 1 corresponds to the ID 2, the first identifier reported by the core network device is ID 1 ', and the identifier of the first terminal device is ID 2', the first device checks whether ID 1 'and ID 2' reported by the core network device are stored. If the first device determines that ID 1 'is the same as ID 1 and ID 2' is the same as ID 2, the first device verifies and stores ID 1 'and ID 2' reported by the core network device. The first device may detect whether the correspondence between ID 1 'and ID 2' is consistent with the correspondence between ID 1 and ID 2, and if so, the first device determines that the terminal device may access the first network; and if the terminal equipment is not consistent with the first network, the first equipment determines that the terminal equipment cannot access the first network.
If the first device determines that the terminal device can access the first network, the method of the embodiment of the present application may further include: the method comprises the steps that first equipment determines the effective duration of the terminal equipment accessing a first network and/or first service allowing the terminal equipment to access, wherein the first service is the service of the first network accessed by the terminal equipment. For example, the first service may be internet surfing and short message sending.
Optionally, the check response message may include an effective duration of the terminal device accessing the first network and/or a first service allowed to be accessed by the terminal device.
As an example, the first device may determine an effective duration of the terminal device accessing the first network according to the traffic of the first network at the current time.
For example, if the traffic of the first network is large at the current time, the effective duration of the terminal device accessing the first network may be short, for example, 1 hour; if the traffic of the first network is small at the current time, the effective duration of accessing the first network by the terminal device may be longer, for example, 2 hours.
As yet another example, the first device may determine an effective duration for the terminal device to access the first network based on a preset value.
Alternatively, the preset value may be protocol specified. The effective duration for the terminal device to access the first network is 2 hours as specified by the protocol.
Optionally, the first service allowed to be accessed by the terminal device and included in the check response message may be a service type and an identity of the first service.
Alternatively, the identifier may be, for example, an application Name, a Data Network Name (DNN), Single Network Slice Selection Assistance Information (S-NSSAI).
The method of the embodiment of the application may further include: the core network equipment calls a signing request service to the UDM of the PLMN, wherein the signing request service is used for requesting signing information of the terminal equipment; the core network device receives a subscription request response service called by the UDM, where the subscription request response service includes third indication information, where the third indication information may be used to indicate a second service that allows the terminal device to access, and the second service is a PLMN service that the terminal device accesses through the first network. For example, the second service may be a Voice call, a Voice over Long-Term Evolution (VoLTE) Voice bearer, and the like.
Optionally, the core network device may obtain an identifier of the PLMN from the identifier of the terminal device, and then invoke the subscription request service to the UDM of the PLMN based on the identifier of the PLMN.
Alternatively, the third indication information may indicate the second service to which the terminal device is allowed to access by indicating a service type and an identity of the second service.
Alternatively, the service identification of the second service may be, for example, the application name, DNN and S-NSSAI.
After the core network device obtains the first service and the second service that allow the terminal device to access, optionally, the method of the embodiment of the present application may further include: the terminal device receives second indication information sent by the core network device, wherein the second indication information is used for indicating a first service and/or a second service which is allowed to be accessed by the terminal device.
Optionally, the third indication information may be carried in the second request response message.
Optionally, after the core network device sends the second request response message to the terminal device, a NAS message may be sent to the terminal device, and the third indication information may be carried in the NAS message.
It should be understood that, in the embodiments of the present application, the terms "first", "second" and "third" are merely used to distinguish different objects, and do not limit the scope of the embodiments of the present application.
It should also be understood that the term "and/or" herein is merely one type of association that describes an associated object, meaning that three relationships may exist, e.g., a and/or B may mean: a exists alone, A and B exist simultaneously, and B exists alone.
Fig. 5 provides a detailed schematic of an embodiment of the present application. In fig. 5, the first Network is TAN, the first identifier is a first ID, the terminal device subscribed to the PLMN is PLMN UE, the identifier of the PLMN UE is IMSI, the Access Network device of the first Network is Radio Access Network (RAN) -a, and the core Network device of the first Network is AMF-a.
At 510, the PLMN UE transmits a first request message to a first device requesting access to a first ID of a TAN. Wherein, the first request message includes the IMSI.
After receiving the first request message, the first device allocates the first ID and the effective duration of the first ID to the PLMN UE, and stores the corresponding relation between the first ID and the IMSI.
In 520, the first device sends a first request response message to the PLMN UE, where the first request response message includes the first ID and the validity duration of the first ID.
At 530, RAN-a broadcasts the TAN ID.
Optionally, RAN-a may also broadcast an indication that PLMN UEs are allowed to access the TAN.
At 540, the PLMN UE sends a second request message to AMF-a if the first ID is still within the validity duration.
The second request message may include the IMSI, the first ID, and indication information indicating that the UE is a PLMN UE.
Optionally, the second request message may be a registration request message, or may be an NAS message carrying a PDU session establishment request message.
And if the AMF-a identifies that the UE is the PLMN UE, the AMF-a checks the access of the PLMN UE and acquires the PLMN ID from the IMSI.
In 541, the AMF-a invokes a subscription request service to the UDM of the PLMN based on the PLMN ID, and the UDM invokes a subscription request response service to the core network device.
Optionally, the subscription request response service may indicate that the PLMN UE is allowed to access the PLMN service and the ID + DNN + S-NSSAI of the service through the TAN.
At 550, AMF-a sends a check request message to the first device, the check request message including the IMSI and the first ID.
And after receiving the check request message, the first device checks whether the PLMN UE can access the TAN, and if the PLMN UE can access the TAN, the first device determines the effective duration of the TAN which can be accessed by the PLMN UE and the service type and the ID of the TAN which can be accessed.
In 560, the first device sends a check response message to the AMF-a, where the check response message includes the IMSI, the first ID, the validity duration of the TAN that can be accessed, and the service type and ID of the TAN that the PLMN UE is allowed to access.
In 570, AMF-a sends a second request response message to the PLMN UE.
The second request response message comprises the first ID, the verification result, the effective duration of the accessible TAN, the service type and the ID of the TAN which allows the PLMN UE to access, and the service type and the ID of the PLMN which allows the PLMN UE to access through the TAN.
According to the embodiment of the application, when the terminal equipment signed with the PLMN enters the non-public core network deployed by the operator, the terminal equipment can obtain the identifier of the non-public core network deployed by the access operator, so that the non-public core network deployed by the operator can be accessed based on the obtained identifier.
It should be understood that, in the various embodiments of the present application, the sequence numbers of the above-mentioned processes do not mean the execution sequence, and the execution sequence of each process should be determined by its function and inherent logic, and should not constitute any limitation to the implementation process of the embodiments of the present application.
Having described the communication method according to the embodiment of the present application in detail above, an apparatus according to the embodiment of the present application will be described below with reference to fig. 6 to 9, and the technical features described in the method embodiment are applicable to the following apparatus embodiments.
Fig. 6 shows a schematic block diagram of a terminal device 600 of an embodiment of the present application. As shown in fig. 6, the terminal apparatus 600 includes:
the processing unit 610 is configured to obtain a first identifier for accessing a first network, where the first network is a non-public core network deployed by an operator, and the terminal device 600 has a subscription with a PLMN.
The processing unit 610 is further configured to access the first network based on the first identity.
Optionally, in this embodiment of the present application, the terminal device 600 further includes: a communication unit 620, configured to send a first request message to a first device, where the first request message is used to request a first identifier, and the request message includes the identifier of the terminal device 600;
the communication unit 620 is further configured to receive a first request response message sent by the first device, where the first request response message includes the first identifier.
Optionally, in this embodiment of the present application, the first request response message further includes a valid duration of the first identifier.
Optionally, in this embodiment of the present application, the first device is a core network device, an application server, or a user equipment.
Optionally, in this embodiment of the present application, the terminal device 600 further includes: a communication unit 620, configured to send a second request message to a core network device, where the second request message includes the first identifier and the identifier of the terminal device 600;
the communication unit 620 is further configured to receive a second request response message sent by the core network device, where the second request response message is used to indicate whether to allow the terminal device 600 to access the first network.
Optionally, in this embodiment of the application, the second request message further includes first indication information, where the first indication information is used to indicate that the terminal device 600 has a subscription with a PLMN.
Optionally, in this embodiment of the present application, the second request response message includes an effective duration of accessing the first network by the terminal device 600.
Optionally, in this embodiment of the present application, the terminal device 600 further includes: a communication unit 620, configured to receive second indication information sent by a core network device, where the second indication information is used to indicate a first service and/or a second service that the terminal device 600 is allowed to access, where the first service is a service of a first network that the terminal device 600 accesses, and the second service is a service of a PLMN that the terminal device 600 accesses through the first network.
Optionally, in this embodiment of the present application, the core network device is a core network device of a first network.
It should be understood that the terminal device 600 may correspond to the terminal device in the method 200, and corresponding operations of the terminal device in the method 200 may be implemented, which are not described herein again for brevity.
Fig. 7 shows a schematic block diagram of a core network device 700 according to an embodiment of the present application. As shown in fig. 7, the core network device 700 includes:
a communication unit 710, configured to receive a second request message sent by a terminal device, where the second request message includes a first identifier of the terminal device accessing to a first network and an identifier of the terminal device, the first network is a non-public core network deployed by an operator, and the terminal device has a subscription with a PLMN.
The communication unit 710 is further configured to send a second request response message to the terminal device, where the second request response message is used to indicate whether the terminal device is allowed to access the first network.
Optionally, in this embodiment of the present application, the core network device 700 further includes: a processing unit 720, configured to determine whether to allow the terminal device to access the first network according to the first identifier and the identifier of the terminal device.
Optionally, in this embodiment of the present application, the communication unit 710 is specifically configured to: sending a verification request message to the first equipment, wherein the verification request message comprises a first terminal equipment identifier and a first identifier;
receiving a verification response message sent by the first equipment, wherein the verification response message comprises a verification result of whether the terminal equipment is allowed to access the first network or not;
the processing unit 720 is specifically configured to: and determining whether the terminal equipment is allowed to access the first network or not based on the checking result.
Optionally, in this embodiment of the application, the check response message further includes an effective duration for the terminal device to access the first network and/or a first service allowed to be accessed by the terminal device, where the first service is a service of the first network to which the terminal device accesses.
Optionally, in this embodiment of the present application, the first device is a core network device, an application server, or a user equipment.
Optionally, in this embodiment of the present application, the core network device 700 further includes: a processing unit 720, configured to determine whether the terminal device has a subscription with the PLMN.
Optionally, in this embodiment of the application, the processing unit 720 is specifically configured to: and determining whether the terminal equipment has a subscription with the PLMN or not based on first indication information, wherein the first indication information is used for indicating that the terminal equipment has the subscription with the PLMN.
Optionally, in this embodiment of the application, the first indication information is identification information of the terminal device.
Optionally, in this embodiment of the present application, the core network device 700 further includes: a processing unit 720, configured to invoke a subscription request service to the UDM of the PLMN, where the subscription request service is used to request subscription information of a terminal device;
the communication unit 710 is further configured to: and receiving a subscription request response service called by the UDM, wherein the subscription request response service comprises third indication information, the third indication information is used for indicating a second service which allows the terminal equipment to access, and the second service is a PLMN service which is accessed by the terminal equipment through a first network.
Optionally, in this embodiment of the present application, the communication unit 710 is further configured to: and sending second indication information to the terminal equipment, wherein the second indication information is used for indicating a first service and/or a second service which allows the terminal equipment to access, the first service is a service of a first network which the terminal equipment accesses, and the second service is a service of a PLMN which the terminal equipment accesses through the first network.
Optionally, in this embodiment of the present application, the second request response message includes an effective duration of the terminal device accessing the first network.
Optionally, in this embodiment of the present application, the core network device 700 is a core network device of a first network.
It should be understood that the core network device 700 may correspond to the core network device in the method 400, and corresponding operations of the core network device in the method 400 may be implemented, which are not described herein again for brevity.
Fig. 8 shows a schematic block diagram of a communication device 800 of an embodiment of the present application, where the communication device 800 is a first device of an embodiment of the present application. As shown in fig. 8, the communication apparatus 800 includes:
a communication unit 810, configured to receive a first request message sent by a terminal device, where the first request message is used to request access to a first identifier of a first network, the first network is a non-public core network deployed by an operator, and the terminal device has a subscription with a PLMN.
The communication unit 810 is further configured to send a first request response message to the terminal device, where the first request response message includes the first identifier.
Optionally, in this embodiment of the present application, the first request response message further includes a valid duration of the first identifier.
Optionally, in this embodiment of the present application, the communication unit 810 is further configured to: receiving a verification request message sent by core network equipment, wherein the verification request message comprises a first terminal equipment identifier and a first identifier;
the communication device 810 further comprises: a processing unit 820, configured to verify the terminal device based on the first terminal device identifier and the first identifier, to obtain a verification result;
the processing unit 820 is further configured to determine whether to allow the terminal device to access the first network based on the checking result.
Optionally, in this embodiment of the application, the first request message includes an identifier of the terminal device, and the processing unit 820 is further configured to: and storing a second identifier and the identifier of the terminal equipment, wherein the second identifier is the identifier of the terminal equipment accessing the first network.
Optionally, in this embodiment of the application, the processing unit 820 is specifically configured to: determining whether the stored second identifier and the identifier of the terminal equipment are consistent with the identifier of the first terminal equipment and the first identifier reported by the core network equipment;
if the network access request is consistent with the network access request, allowing the terminal equipment to access the first network; and if the two networks are not consistent, the terminal equipment is not allowed to access the first network.
Optionally, in this embodiment of the application, if the processing unit 820 determines to allow the terminal device to access the first network, the processing unit 820 is further configured to: and determining the effective duration of the terminal equipment accessing the first network.
Optionally, in this embodiment of the present application, the communication unit 810 is further configured to: and sending a verification response message to the core network equipment, wherein the verification response message comprises a verification result and the effective duration of the terminal equipment accessing the first network.
Optionally, in this embodiment of the present application, the check response message further includes a first service that the terminal device is allowed to access, where the first service is a service of a first network that the terminal device accesses.
Optionally, in this embodiment of the present application, the core network device is a core network device of a first network.
Optionally, in this embodiment of the present application, the first device is a core network device, an application server, or a user equipment.
It is understood that the communication device 800 may correspond to the communication device in the method 500, and corresponding operations of the communication device in the method 500 may be implemented, which are not described herein again for brevity.
Fig. 9 is a schematic structural diagram of a communication device 900 according to an embodiment of the present application. The communication device 900 shown in fig. 9 includes a processor 910, and the processor 910 can call and run a computer program from a memory to implement the method in the embodiment of the present application.
Optionally, as shown in fig. 9, the communication device 900 may also include a memory 920. From the memory 920, the processor 910 can call and run a computer program to implement the method in the embodiment of the present application.
The memory 920 may be a separate device from the processor 910, or may be integrated in the processor 910.
Optionally, as shown in fig. 9, the communication device 900 may further include a transceiver 930, and the processor 910 may control the transceiver 930 to communicate with other devices, and specifically, may transmit information or data to the other devices or receive information or data transmitted by the other devices.
The transceiver 930 may include a transmitter and a receiver, among others. The transceiver 930 may further include one or more antennas.
Optionally, the communication device 900 may specifically be a terminal device in this embodiment, and the communication device 900 may implement a corresponding process implemented by the terminal device in each method in this embodiment, which is not described herein again for brevity.
Optionally, the communication device 900 may specifically be a core network device in this embodiment, and the communication device 900 may implement a corresponding procedure implemented by the core network device in each method in this embodiment, which is not described herein again for brevity.
Optionally, the communication device 900 may specifically be a first device in this embodiment, and the communication device 900 may implement a corresponding process implemented by the first device in each method in this embodiment, which is not described herein again for brevity.
Fig. 10 is a schematic structural diagram of a chip of an embodiment of the present application. The chip 1000 shown in fig. 10 includes a processor 1010, and the processor 1010 may call and run a computer program from a memory to implement the method in the embodiment of the present application.
Optionally, as shown in fig. 10, the chip 1000 may further include a memory 1020. From the memory 1020, the processor 1010 may call and execute a computer program to implement the method in the embodiment of the present application.
The memory 1020 may be a separate device from the processor 1010 or may be integrated into the processor 1010.
Optionally, the chip 1000 may further include an input interface 1030. The processor 1010 may control the input interface 1030 to communicate with other devices or chips, and specifically may obtain information or data transmitted by the other devices or chips.
Optionally, the chip 1000 may further include an output interface 1040. The processor 1010 may control the output interface 1040 to communicate with other devices or chips, and may particularly output information or data to the other devices or chips.
Optionally, the chip may be applied to the terminal device in the embodiment of the present application, and the chip may implement the corresponding process implemented by the terminal device in each method in the embodiment of the present application, and for brevity, details are not described here again.
Optionally, the chip may be applied to the core network device in the embodiment of the present application, and the chip may implement a corresponding process implemented by the core network device in each method in the embodiment of the present application, and for brevity, details are not described here again.
Optionally, the chip may be applied to the first device in the embodiment of the present application, and the chip may implement a corresponding process implemented by the first device in each method in the embodiment of the present application, and for brevity, details are not described here again.
It should be understood that the chips mentioned in the embodiments of the present application may also be referred to as a system-on-chip, a system-on-chip or a system-on-chip, etc.
It should be understood that the processor of the embodiments of the present application may be an integrated circuit chip having signal processing capabilities. In implementation, the steps of the above method embodiments may be performed by integrated logic circuits of hardware in a processor or instructions in the form of software. The Processor may be a general purpose Processor, a Digital Signal Processor (DSP), an Application Specific Integrated Circuit (ASIC), an off-the-shelf Programmable Gate Array (FPGA) or other Programmable logic device, discrete Gate or transistor logic device, or discrete hardware components. The various methods, steps, and logic blocks disclosed in the embodiments of the present application may be implemented or performed. A general purpose processor may be a microprocessor or the processor may be any conventional processor or the like. The steps of the method disclosed in connection with the embodiments of the present application may be directly implemented by a hardware decoding processor, or implemented by a combination of hardware and software modules in the decoding processor. The software module may be located in ram, flash memory, rom, prom, or eprom, registers, etc. storage media as is well known in the art. The storage medium is located in a memory, and a processor reads information in the memory and completes the steps of the method in combination with hardware of the processor.
It will be appreciated that the memory in the embodiments of the subject application can be either volatile memory or nonvolatile memory, or can include both volatile and nonvolatile memory. The non-volatile Memory may be a Read-Only Memory (ROM), a Programmable ROM (PROM), an Erasable PROM (EPROM), an Electrically Erasable PROM (EEPROM), or a flash Memory. Volatile Memory can be Random Access Memory (RAM), which acts as external cache Memory. By way of example, but not limitation, many forms of RAM are available, such as Static random access memory (Static RAM, SRAM), Dynamic Random Access Memory (DRAM), Synchronous Dynamic random access memory (Synchronous DRAM, SDRAM), Double Data Rate Synchronous Dynamic random access memory (DDR SDRAM), Enhanced Synchronous SDRAM (ESDRAM), Synchronous link SDRAM (SLDRAM), and Direct Rambus RAM (DR RAM). It should be noted that the memory of the systems and methods described herein is intended to comprise, without being limited to, these and any other suitable types of memory.
It should be understood that the above memories are exemplary but not limiting illustrations, for example, the memories in the embodiments of the present application may also be Static Random Access Memory (SRAM), dynamic random access memory (dynamic RAM, DRAM), Synchronous Dynamic Random Access Memory (SDRAM), double data rate SDRAM (DDR SDRAM), enhanced SDRAM (enhanced SDRAM, ESDRAM), Synchronous Link DRAM (SLDRAM), Direct Rambus RAM (DR RAM), and the like. That is, the memory in the embodiments of the present application is intended to comprise, without being limited to, these and any other suitable types of memory.
Fig. 11 is a schematic block diagram of a communication system 1100 provided in an embodiment of the present application. As shown in fig. 11, the communication system 1100 includes a terminal device 1110, a core network device 1120, and a first device 1130.
The terminal device 1110 may be configured to implement the corresponding function implemented by the terminal device in the foregoing method, the core network device 1120 may be configured to implement the corresponding function implemented by the core network device in the foregoing method, and the first device 1130 may be configured to implement the corresponding function implemented by the first device in the foregoing method, which is not described herein again for brevity.
The embodiment of the application also provides a computer readable storage medium for storing the computer program.
Optionally, the computer-readable storage medium may be applied to the terminal device in the embodiment of the present application, and the computer program enables the computer to execute the corresponding process implemented by the terminal device in each method in the embodiment of the present application, which is not described herein again for brevity.
Optionally, the computer-readable storage medium may be applied to the core network device in the embodiment of the present application, and the computer program enables the computer to execute the corresponding process implemented by the core network device in each method in the embodiment of the present application, which is not described herein again for brevity.
Optionally, the computer-readable storage medium may be applied to the first device in the embodiment of the present application, and the computer program enables the computer to execute the corresponding process implemented by the first device in each method in the embodiment of the present application, which is not described herein again for brevity.
Embodiments of the present application also provide a computer program product comprising computer program instructions.
Optionally, the computer program product may be applied to the terminal device in the embodiment of the present application, and the computer program instructions enable the computer to execute the corresponding processes implemented by the terminal device in the methods in the embodiment of the present application, which are not described herein again for brevity.
Optionally, the computer program product may be applied to the core network device in the embodiment of the present application, and the computer program instructions enable the computer to execute the corresponding processes implemented by the core network device in the methods in the embodiments of the present application, which are not described herein again for brevity.
Optionally, the computer program product may be applied to the first device in the embodiment of the present application, and the computer program instructions enable the computer to execute the corresponding processes implemented by the first device in the methods in the embodiment of the present application, which are not described herein again for brevity.
The embodiment of the application also provides a computer program.
Optionally, the computer program may be applied to the terminal device in the embodiment of the present application, and when the computer program runs on a computer, the computer is enabled to execute the corresponding process implemented by the terminal device in each method in the embodiment of the present application, and for brevity, details are not described here again.
Optionally, the computer program may be applied to the core network device in the embodiment of the present application, and when the computer program runs on a computer, the computer is enabled to execute a corresponding process implemented by the core network device in each method in the embodiment of the present application, which is not described herein again for brevity.
Optionally, the computer program may be applied to the first device in the embodiment of the present application, and when the computer program runs on a computer, the computer is enabled to execute a corresponding process implemented by the first device in each method in the embodiment of the present application, and for brevity, details are not described here again.
Those of ordinary skill in the art will appreciate that the various illustrative elements and algorithm steps described in connection with the embodiments disclosed herein may be implemented as electronic hardware or combinations of computer software and electronic hardware. Whether such functionality is implemented as hardware or software depends upon the particular application and design constraints imposed on the implementation. Skilled artisans may implement the described functionality in varying ways for each particular application, but such implementation decisions should not be interpreted as causing a departure from the scope of the present application.
It is clear to those skilled in the art that, for convenience and brevity of description, the specific working processes of the above-described systems, apparatuses and units may refer to the corresponding processes in the foregoing method embodiments, and are not described herein again.
In the several embodiments provided in the present application, it should be understood that the disclosed system, apparatus and method may be implemented in other ways. For example, the above-described apparatus embodiments are merely illustrative, and for example, the division of the units is only one logical division, and other divisions may be realized in practice, for example, a plurality of units or components may be combined or integrated into another system, or some features may be omitted, or not executed. In addition, the shown or discussed mutual coupling or direct coupling or communication connection may be an indirect coupling or communication connection through some interfaces, devices or units, and may be in an electrical, mechanical or other form.
The units described as separate parts may or may not be physically separate, and parts displayed as units may or may not be physical units, may be located in one place, or may be distributed on a plurality of network units. Some or all of the units can be selected according to actual needs to achieve the purpose of the solution of the embodiment.
In addition, functional units in the embodiments of the present application may be integrated into one processing unit, or each unit may exist alone physically, or two or more units are integrated into one unit.
The functions, if implemented in the form of software functional units and sold or used as a stand-alone product, may be stored in a computer readable storage medium. Based on such understanding, the technical solution of the present application or portions thereof that substantially contribute to the prior art may be embodied in the form of a software product stored in a storage medium and including instructions for causing a computer device (which may be a personal computer, a server, or a network device) to execute all or part of the steps of the method according to the embodiments of the present application. And the aforementioned storage medium includes: various media capable of storing program codes, such as a usb disk, a removable hard disk, a Read-Only Memory (ROM), a Random Access Memory (RAM), a magnetic disk, or an optical disk.
The above description is only for the specific embodiments of the present application, but the scope of the present application is not limited thereto, and any person skilled in the art can easily conceive of the changes or substitutions within the technical scope of the present application, and shall be covered by the scope of the present application. Therefore, the protection scope of the present application shall be subject to the protection scope of the claims.

Claims (77)

  1. A method of communication, the method comprising:
    a terminal device acquires a first identifier accessed to a first network, wherein the first network is a non-public core network deployed by an operator, and the terminal device has a subscription with a Public Land Mobile Network (PLMN);
    and the terminal equipment accesses the first network based on the first identifier.
  2. The method of claim 1, wherein the obtaining, by the terminal device, the first identity for accessing the first network comprises:
    the terminal device sends a first request message to a first device, wherein the first request message is used for requesting the first identifier, and the request message comprises the identifier of the terminal device;
    and the terminal equipment receives a first request response message sent by the first equipment, wherein the first request response message comprises the first identifier.
  3. The method of claim 2, wherein the first request response message further comprises a validity duration of the first identifier.
  4. The method of claim 2 or 3, wherein the first device is a core network device, an application server, or a user equipment.
  5. The method according to any of claims 1 to 4, wherein the terminal device accessing the first network based on the first identity comprises:
    the terminal equipment sends a second request message to core network equipment, wherein the second request message comprises the first identifier and the identifier of the terminal equipment;
    and the terminal equipment receives a second request response message sent by the core network equipment, wherein the second request response message is used for indicating whether the terminal equipment is allowed to access the first network or not.
  6. The method of claim 5, wherein the second request message further comprises first indication information, and wherein the first indication information is used for indicating that the terminal device has a subscription with a PLMN.
  7. The method according to claim 5 or 6, wherein the second request response message comprises an effective duration of the terminal device accessing the first network.
  8. The method according to any one of claims 1 to 7, further comprising:
    the terminal device receives second indication information sent by a core network device, where the second indication information is used to indicate a first service and/or a second service that the terminal device is allowed to access, where the first service is a service of the first network that the terminal device accesses, and the second service is a service of a PLMN that the terminal device accesses through the first network.
  9. The method according to any of claims 5 to 8, wherein the core network device is a core network device of the first network.
  10. A method of communication, the method comprising:
    the method comprises the steps that core network equipment receives a second request message sent by terminal equipment, wherein the second request message comprises a first identifier of the terminal equipment accessing a first network and an identifier of the terminal equipment, the first network is a non-public core network deployed by an operator, and the terminal equipment is signed with a Public Land Mobile Network (PLMN);
    and the core network equipment sends a second request response message to the terminal equipment, wherein the second request response message is used for indicating whether the terminal equipment is allowed to access the first network or not.
  11. The method according to claim 10, wherein before the core network device sends the second request response message to the terminal device, the method further comprises:
    and the core network equipment determines whether to allow the terminal equipment to access the first network or not according to the first identifier and the identifier of the terminal equipment.
  12. The method of claim 11, wherein the determining, by the core network device, whether to allow the terminal device to access the first network according to the first identifier and the identifier of the terminal device comprises:
    the core network equipment sends a check request message to first equipment, wherein the check request message comprises a first terminal equipment identifier and the first identifier;
    the core network equipment receives a verification response message sent by the first equipment, wherein the verification response message comprises a verification result of whether the terminal equipment is allowed to access the first network or not;
    and the core network equipment determines whether to allow the terminal equipment to access the first network or not based on the verification result.
  13. The method according to claim 12, wherein the check response message further includes a validity duration of accessing the first network by the terminal device and/or a first service allowed to be accessed by the terminal device, wherein the first service is a service of the first network accessed by the terminal device.
  14. The method of claim 12 or 13, wherein the first device is a core network device, an application server, or a user equipment.
  15. The method according to any one of claims 10 to 14, further comprising:
    and the core network equipment determines whether the terminal equipment has a subscription with the PLMN or not.
  16. The method of claim 15, wherein the determining, by the core network device, whether the terminal device has a subscription with a PLMN comprises:
    the core network device determines whether the terminal device has a subscription with a PLMN based on first indication information, wherein the first indication information is used for indicating that the terminal device has a subscription with the PLMN.
  17. The method of claim 16, wherein the first indication information is identification information of the terminal device.
  18. The method according to any one of claims 10 to 17, further comprising:
    the core network equipment calls a signing request service to a Unified Data Management (UDM) of a PLMN, wherein the signing request service is used for requesting signing information of the terminal equipment;
    and the core network equipment receives a signing request response service called by the UDM, wherein the signing request response service contains third indication information, the third indication information is used for indicating a second service allowing the terminal equipment to access, and the second service is a PLMN service accessed by the terminal equipment through the first network.
  19. The method according to any one of claims 10 to 18, further comprising:
    the core network device sends second indication information to the terminal device, where the second indication information is used to indicate a first service and/or a second service that the terminal device is allowed to access, where the first service is a service of the first network that the terminal device accesses, and the second service is a service of a PLMN that the terminal device accesses through the first network.
  20. The method according to any of claims 10 to 19, wherein the second request response message comprises an effective duration of the terminal device accessing the first network.
  21. The method according to any of claims 10 to 20, wherein the core network device is a core network device of the first network.
  22. A method of communication, the method comprising:
    a first device receives a first request message sent by a terminal device, wherein the first request message is used for requesting to access a first identifier of a first network, the first network is a non-public core network deployed by an operator, and the terminal device has a subscription with a Public Land Mobile Network (PLMN);
    and the first equipment sends a first request response message to the terminal equipment, wherein the first request response message comprises the first identifier.
  23. The method of claim 22, wherein the first request response message further comprises a validity duration of the first identifier.
  24. The method according to claim 22 or 23, further comprising:
    the first device receives a check request message sent by a core network device, wherein the check request message comprises a first terminal device identifier and the first identifier;
    the first equipment checks the terminal equipment based on the first terminal equipment identification and the first identification to obtain a checking result;
    and the first equipment determines whether the terminal equipment is allowed to access the first network or not based on the verification result.
  25. The method of claim 24, wherein the first request message includes an identification of the terminal device, and wherein the method further comprises:
    and the first equipment stores a second identifier and the identifier of the terminal equipment, wherein the second identifier is the identifier of the terminal equipment accessing the first network.
  26. The method of claim 25, wherein the first device verifies the terminal device based on the first terminal device identifier and the first identifier, comprising:
    the first device determines whether the stored second identifier and the identifier of the terminal device are consistent with the first identifier and the first identifier reported by the core network device;
    if the network access request is consistent with the network access request, the first equipment allows the terminal equipment to access the first network;
    and if the terminal equipment is not consistent with the first network, the first equipment does not allow the terminal equipment to access the first network.
  27. The method according to any of claims 24 to 26, wherein if the first device determines to allow the terminal device to access the first network, the method further comprises:
    and the first equipment determines the effective duration of the terminal equipment accessing the first network.
  28. The method of claim 27, further comprising:
    and the first equipment sends a verification response message to the core network equipment, wherein the verification response message comprises the verification result.
  29. The method of claim 28, wherein the check response message further includes a validity duration for accessing the first network by the terminal device and/or a first service allowed to be accessed by the terminal device, and wherein the first service is a service of the first network accessed by the terminal device.
  30. The method according to any of claims 24 to 29, wherein the core network device is a core network device of the first network.
  31. The method according to any of claims 22 to 30, wherein the first device is a core network device, an application server or a user equipment.
  32. A terminal device, comprising:
    a processing unit, configured to acquire a first identifier for accessing a first network, where the first network is a non-public core network deployed by an operator, and the terminal device has a subscription with a public land mobile network PLMN;
    the processing unit is further configured to access the first network based on the first identifier.
  33. The terminal device of claim 32, wherein the terminal device further comprises:
    a communication unit, configured to send a first request message to a first device, where the first request message is used to request the first identifier, and the request message includes an identifier of the terminal device;
    the communication unit is further configured to receive a first request response message sent by the first device, where the first request response message includes the first identifier.
  34. The terminal device of claim 33, wherein the first request response message further comprises a validity duration of the first identifier.
  35. The terminal device according to claim 33 or 34, wherein the first device is a core network device, an application server or a user equipment.
  36. The terminal device according to any of claims 32 to 35, wherein the terminal device further comprises:
    a communication unit, configured to send a second request message to a core network device, where the second request message includes the first identifier and an identifier of the terminal device;
    the communication unit is further configured to receive a second request response message sent by the core network device, where the second request response message is used to indicate whether to allow the terminal device to access the first network.
  37. The terminal device of claim 36, wherein the second request message further comprises first indication information, and wherein the first indication information is used to indicate that the terminal device has a subscription with a PLMN.
  38. The terminal device according to claim 36 or 37, wherein the second request response message comprises an effective duration of the terminal device accessing the first network.
  39. The terminal device according to any of claims 32 to 38, wherein the terminal device further comprises:
    a communication unit, configured to receive second indication information sent by a core network device, where the second indication information is used to indicate a first service and/or a second service that allows the terminal device to access, where the first service is a service of the first network that the terminal device accesses, and the second service is a service of a PLMN that the terminal device accesses through the first network.
  40. The terminal device according to any of claims 36 to 39, wherein the core network device is a core network device of the first network.
  41. A core network device, comprising:
    a communication unit, configured to receive a second request message sent by a terminal device, where the second request message includes a first identifier of the terminal device accessing a first network and an identifier of the terminal device, the first network is a non-public core network deployed by an operator, and the terminal device has a subscription with a public land mobile network PLMN;
    the communication unit is further configured to send a second request response message to the terminal device, where the second request response message is used to indicate whether the terminal device is allowed to access the first network.
  42. The core network device of claim 42, wherein the core network device further comprises:
    and the processing unit is used for determining whether the terminal equipment is allowed to access the first network or not according to the first identifier and the identifier of the terminal equipment.
  43. The core network device of claim 42, wherein the communication unit is specifically configured to:
    sending a checking request message to a first device, wherein the checking request message comprises a first terminal device identifier and the first identifier;
    receiving a verification response message sent by the first device, wherein the verification response message comprises a verification result of whether the terminal device is allowed to access the first network;
    the processing unit is specifically configured to:
    and determining whether the terminal equipment is allowed to access the first network or not based on the checking result.
  44. The core network device according to claim 43, wherein the check response message further includes an effective duration for accessing the first network by the terminal device and/or a first service allowed to be accessed by the terminal device, wherein the first service is a service of the first network to which the terminal device accesses.
  45. Core network device according to claim 43 or 44, wherein the first device is a core network device, an application server or a user equipment.
  46. Core network device according to any of claims 41 to 45, wherein the core network device further comprises:
    and the processing unit is used for determining whether the terminal equipment has a subscription with the PLMN.
  47. The core network device of claim 46, wherein the processing unit is specifically configured to:
    and determining whether the terminal equipment has a subscription with the PLMN or not based on first indication information, wherein the first indication information is used for indicating that the terminal equipment has the subscription with the PLMN.
  48. The core network device of claim 47, wherein the first indication information is identification information of the terminal device.
  49. Core network device according to any of claims 41 to 48, wherein the core network device further comprises:
    the processing unit is used for calling a signing request service to a Unified Data Management (UDM) of a Public Land Mobile Network (PLMN), wherein the signing request service is used for requesting signing information of the terminal equipment;
    the communication unit is further configured to:
    and receiving a subscription request response service called by the UDM, wherein the subscription request response service comprises third indication information, the third indication information is used for indicating a second service allowing the terminal equipment to access, and the second service is a PLMN service accessed by the terminal equipment through the first network.
  50. Core network device according to any of claims 41 to 49, wherein the communication unit is further configured to:
    and sending second indication information to the terminal equipment, wherein the second indication information is used for indicating a first service and/or a second service which allows the terminal equipment to access, the first service is a service of the first network which the terminal equipment accesses, and the second service is a service of a PLMN which the terminal equipment accesses through the first network.
  51. The core network device according to any of claims 41 to 50, wherein the second request response message comprises a validity duration for the terminal device to access the first network.
  52. Core network device according to any of claims 41 to 51, wherein the core network device is a core network device of the first network.
  53. A communication device, wherein the communication device is a first device, comprising:
    a communication unit, configured to receive a first request message sent by a terminal device, where the first request message is used to request access to a first identifier of a first network, the first network is a non-public core network deployed by an operator, and the terminal device has a subscription with a public land mobile network PLMN;
    the communication unit is further configured to send a first request response message to the terminal device, where the first request response message includes the first identifier.
  54. The communications device of claim 53, wherein said first request response message further includes a validity duration of said first identifier.
  55. The communication device of claim 53 or 54, wherein the communication unit is further configured to:
    receiving a verification request message sent by core network equipment, wherein the verification request message comprises a first terminal equipment identifier and the first identifier;
    the communication device further includes:
    the processing unit is used for verifying the terminal equipment based on the first terminal equipment identifier and the first identifier to obtain a verification result;
    the processing unit is further configured to determine whether to allow the terminal device to access the first network based on the check result.
  56. The communications device of claim 55, wherein the first request message includes an identification of the terminal device, and wherein the processing unit is further configured to:
    and storing a second identifier and the identifier of the terminal equipment, wherein the second identifier is the identifier of the terminal equipment accessing the first network.
  57. The communications device of claim 56, wherein the processing unit is specifically configured to:
    determining whether the stored second identifier and the identifier of the terminal device are consistent with the identifier of the first terminal device and the first identifier reported by the core network device;
    if the network access request is consistent with the network access request, allowing the terminal equipment to access the first network;
    and if the network access request is inconsistent with the network access request, the terminal equipment is not allowed to access the first network.
  58. The communications device of any one of claims 55 to 57, wherein if the processing unit determines to allow the terminal device to access the first network, the processing unit is further configured to:
    and determining the effective duration of the terminal equipment accessing the first network.
  59. The communications device of claim 58, wherein said communications unit is further configured to:
    and sending a verification response message to the core network equipment, wherein the verification response message comprises the verification result.
  60. The communications device of claim 59, wherein the check response message further includes a validity duration of accessing the first network by the terminal device and/or a first service allowed to be accessed by the terminal device, wherein the first service is a service of the first network accessed by the terminal device.
  61. The communications device of any one of claims 55 to 60, wherein the core network device is a core network device of the first network.
  62. The communications device of any one of claims 53 to 61, wherein the first device is a core network device, an application server or a user equipment.
  63. A terminal device, comprising: a processor and a memory, the memory for storing a computer program, the processor for invoking and executing the computer program stored in the memory, performing the method of any one of claims 1 to 9.
  64. A core network device, comprising: a processor and a memory, the memory for storing a computer program, the processor for invoking and executing the computer program stored in the memory, performing the method of any one of claims 10 to 21.
  65. A communication device, comprising: a processor and a memory, the memory for storing a computer program, the processor for invoking and executing the computer program stored in the memory, performing the method of any of claims 22 to 31.
  66. A chip, comprising: a processor for calling and running a computer program from a memory so that a device on which the chip is installed performs the method of any one of claims 1 to 9.
  67. A chip, comprising: a processor for calling and running a computer program from a memory so that a device on which the chip is installed performs the method of any one of claims 10 to 21.
  68. A chip, comprising: a processor for calling and running a computer program from a memory so that a device on which the chip is installed performs the method of any one of claims 22 to 31.
  69. A computer-readable storage medium for storing a computer program which causes a computer to perform the method of any one of claims 1 to 9.
  70. A computer-readable storage medium for storing a computer program which causes a computer to perform the method of any one of claims 10 to 21.
  71. A computer-readable storage medium for storing a computer program which causes a computer to perform the method of any one of claims 22 to 31.
  72. A computer program product comprising computer program instructions for causing a computer to perform the method of any one of claims 1 to 9.
  73. A computer program product comprising computer program instructions for causing a computer to perform the method of any one of claims 10 to 21.
  74. A computer program product comprising computer program instructions for causing a computer to perform the method of any one of claims 22 to 31.
  75. A computer program, characterized in that the computer program causes a computer to perform the method according to any of claims 1-9.
  76. A computer program, characterized in that the computer program causes a computer to perform the method according to any of claims 10 to 21.
  77. A computer program, characterized in that the computer program causes a computer to perform the method according to any of claims 22 to 31.
CN201880097268.8A 2018-10-31 2018-10-31 Communication method and device Active CN112655182B (en)

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/CN2018/112924 WO2020087327A1 (en) 2018-10-31 2018-10-31 Communication method and device

Publications (2)

Publication Number Publication Date
CN112655182A true CN112655182A (en) 2021-04-13
CN112655182B CN112655182B (en) 2023-09-15

Family

ID=70461930

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201880097268.8A Active CN112655182B (en) 2018-10-31 2018-10-31 Communication method and device

Country Status (2)

Country Link
CN (1) CN112655182B (en)
WO (1) WO2020087327A1 (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2023131072A1 (en) * 2022-01-06 2023-07-13 维沃移动通信有限公司 Host network access processing method and apparatus, terminal, and network side device

Families Citing this family (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2022021433A1 (en) * 2020-07-31 2022-02-03 Oppo广东移动通信有限公司 Method for device access authentication, terminal device, and cloud platform
CN113676996A (en) * 2021-08-11 2021-11-19 成都中科微信息技术研究院有限公司 Satellite terminal registration method, system and terminal based on DVB and 5G fusion networking
CN114268949A (en) * 2021-11-16 2022-04-01 浙江大学 Network building method of 5G local area network
CN116528349A (en) * 2022-01-24 2023-08-01 华为技术有限公司 Method and device for acquiring subscription information

Citations (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1893426A (en) * 2005-07-08 2007-01-10 中国电信股份有限公司 Method and system for realizing pass-through of fier-wall at personal network video signals
CN101299870A (en) * 2007-04-30 2008-11-05 华为技术有限公司 Control method, system and apparatus for accessing private base station
US20120147834A1 (en) * 2009-08-21 2012-06-14 Samsung Electronics Co. Ltd. network entity, a wireless communication unit and methods for access to a remote private ip network and supporting thereof
CN104980993A (en) * 2015-06-19 2015-10-14 广东欧珀移动通信有限公司 Network access method, mobile communication terminal, network server and network access system
WO2016193783A1 (en) * 2015-05-29 2016-12-08 Nokia Technologies Oy Method and apparatus for implementing network-controlled peer-to-peer connectivity
WO2017034195A1 (en) * 2015-08-26 2017-03-02 엘지전자 주식회사 Method for obtaining operator network identification number of visited network
WO2017067337A1 (en) * 2015-10-23 2017-04-27 中兴通讯股份有限公司 Method and apparatus for controlling monitoring service of proximity-based service
WO2017082532A1 (en) * 2015-11-09 2017-05-18 엘지전자 주식회사 Method for acquiring business operator network identification number of visited network
CN107534929A (en) * 2015-09-18 2018-01-02 华为技术有限公司 Core network selection method, apparatus and system
CN107623909A (en) * 2017-09-30 2018-01-23 广东欧珀移动通信有限公司 Configuration information acquisition, processing method, device and system
CN108605282A (en) * 2016-02-10 2018-09-28 高通股份有限公司 Technology for providing network insertion
CN108632815A (en) * 2017-03-24 2018-10-09 华为技术有限公司 Communication means and equipment

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101009740B (en) * 2007-01-17 2012-05-30 广州市高科通信技术股份有限公司 System and method for implementing simultaneous data and voice access of the dual PPPOE
CN102209124B (en) * 2011-06-08 2014-03-12 杭州华三通信技术有限公司 Method for communication between private network and public network and network address translation equipment
CN103166864B (en) * 2013-03-26 2016-01-20 杭州华三通信技术有限公司 A kind of private network vlan information management method and equipment

Patent Citations (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1893426A (en) * 2005-07-08 2007-01-10 中国电信股份有限公司 Method and system for realizing pass-through of fier-wall at personal network video signals
CN101299870A (en) * 2007-04-30 2008-11-05 华为技术有限公司 Control method, system and apparatus for accessing private base station
US20120147834A1 (en) * 2009-08-21 2012-06-14 Samsung Electronics Co. Ltd. network entity, a wireless communication unit and methods for access to a remote private ip network and supporting thereof
WO2016193783A1 (en) * 2015-05-29 2016-12-08 Nokia Technologies Oy Method and apparatus for implementing network-controlled peer-to-peer connectivity
CN104980993A (en) * 2015-06-19 2015-10-14 广东欧珀移动通信有限公司 Network access method, mobile communication terminal, network server and network access system
WO2017034195A1 (en) * 2015-08-26 2017-03-02 엘지전자 주식회사 Method for obtaining operator network identification number of visited network
US20180234469A1 (en) * 2015-08-26 2018-08-16 Lg Electronics Inc. Method for obtaining operator network identification number of visited network
CN107534929A (en) * 2015-09-18 2018-01-02 华为技术有限公司 Core network selection method, apparatus and system
WO2017067337A1 (en) * 2015-10-23 2017-04-27 中兴通讯股份有限公司 Method and apparatus for controlling monitoring service of proximity-based service
WO2017082532A1 (en) * 2015-11-09 2017-05-18 엘지전자 주식회사 Method for acquiring business operator network identification number of visited network
CN108605282A (en) * 2016-02-10 2018-09-28 高通股份有限公司 Technology for providing network insertion
CN108632815A (en) * 2017-03-24 2018-10-09 华为技术有限公司 Communication means and equipment
CN107623909A (en) * 2017-09-30 2018-01-23 广东欧珀移动通信有限公司 Configuration information acquisition, processing method, device and system

Non-Patent Citations (3)

* Cited by examiner, † Cited by third party
Title
INTERDIGITAL INC: "Solution for supporting Non-standalone NPN", 《3GPP TSG_SA\WG2_ARCH》 *
INTERDIGITAL INC: "Solution for supporting Non-standalone NPN", 《3GPP TSG_SA\WG2_ARCH》, 19 October 2018 (2018-10-19), pages 3 - 4 *
NOKIA, NOKIA SHANGHAI BELL: "S2-188992 \"Access Control for 5G Vertical and LAN Services\"", 3GPP TSG_SA\\WG2_ARCH, no. 2, pages 1 - 3 *

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2023131072A1 (en) * 2022-01-06 2023-07-13 维沃移动通信有限公司 Host network access processing method and apparatus, terminal, and network side device

Also Published As

Publication number Publication date
CN112655182B (en) 2023-09-15
WO2020087327A1 (en) 2020-05-07

Similar Documents

Publication Publication Date Title
CN111787590B (en) Session management method, terminal device and network device
CN113316148B (en) Method and apparatus for network slice authentication
CN112655182B (en) Communication method and device
CN112673687B (en) Registration method, terminal equipment and network equipment
CN113615314A (en) Relay selection method and device and terminal equipment
CN111972005B (en) Method and device for establishing transmission path
CN114342549A (en) Method and apparatus for connecting network
CN112929949B (en) Wireless communication method and communication device
CN113316151B (en) Communication method, device and equipment
CN112655244B (en) Service processing method, device and storage medium
CN113692777A (en) Redirection method and device, terminal equipment and network equipment
CN113796150A (en) Service transmission method and device, and communication equipment
CN111757551B (en) Communication method in Internet of vehicles, terminal equipment and network equipment
CN114303421A (en) Wireless communication method, terminal equipment and network equipment
CN113015230B (en) Wireless communication method and terminal device
CN110720237B (en) Information configuration method and device, and communication equipment
CN112205060B (en) Wireless communication method, access network device, terminal device and core network device
CN112205016A (en) Terminal capability information interaction method, terminal equipment and network equipment
CN113574936A (en) Wireless communication method, terminal equipment and network equipment
CN111869266A (en) Core network selection method and device, terminal equipment and network equipment
CN112385271A (en) Network information transmission method, network information acquisition method, network equipment and terminal equipment
CN112425249A (en) Information transmission method and device, terminal equipment and network equipment
CN112400338A (en) Method and device for establishing data channel and network equipment
CN114363976A (en) Wireless communication method and terminal device
CN112400304A (en) Information transmission method and device and network equipment

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant