CN113518338B - Communication method and communication device - Google Patents

Communication method and communication device Download PDF

Info

Publication number
CN113518338B
CN113518338B CN202010281115.8A CN202010281115A CN113518338B CN 113518338 B CN113518338 B CN 113518338B CN 202010281115 A CN202010281115 A CN 202010281115A CN 113518338 B CN113518338 B CN 113518338B
Authority
CN
China
Prior art keywords
network element
request message
plmn
agent
address
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202010281115.8A
Other languages
Chinese (zh)
Other versions
CN113518338A (en
Inventor
朱强华
吴问付
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Huawei Technologies Co Ltd
Original Assignee
Huawei Technologies Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Huawei Technologies Co Ltd filed Critical Huawei Technologies Co Ltd
Priority to CN202010281115.8A priority Critical patent/CN113518338B/en
Publication of CN113518338A publication Critical patent/CN113518338A/en
Application granted granted Critical
Publication of CN113518338B publication Critical patent/CN113518338B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W8/00Network data management
    • H04W8/02Processing of mobility data, e.g. registration information at HLR [Home Location Register] or VLR [Visitor Location Register]; Transfer of mobility data, e.g. between HLR, VLR or external networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W8/00Network data management
    • H04W8/02Processing of mobility data, e.g. registration information at HLR [Home Location Register] or VLR [Visitor Location Register]; Transfer of mobility data, e.g. between HLR, VLR or external networks
    • H04W8/08Mobility data transfer
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W8/00Network data management
    • H04W8/02Processing of mobility data, e.g. registration information at HLR [Home Location Register] or VLR [Visitor Location Register]; Transfer of mobility data, e.g. between HLR, VLR or external networks
    • H04W8/08Mobility data transfer
    • H04W8/082Mobility data transfer for traffic bypassing of mobility servers, e.g. location registers, home PLMNs or home agents

Abstract

The application provides a communication method and a communication device. The method comprises the following steps: a first agent in a first Public Land Mobile Network (PLMN) receives a first request message sent by a first network element of an independent non-public network (SNPN); the first agent determines the second network element according to the first request message; the first agent sends a second request message to the second network element; the first agent receives a first response message sent by the second network element; the first proxy forwards the first response message to the first network element. The technical scheme provided by the application is favorable for improving the safety and the stability of the PLMN network, and reduces the impact and the influence of a plurality of SNPN networks on the PLMN network.

Description

Communication method and communication device
Technical Field
The present application relates to the field of communications, and more particularly, to a communication method and a communication apparatus.
Background
A non-public network (NPN) is a non-public 5G network, in which an independent non-public network (SNPN) is deployed independently and can be implemented independently of network functions of a Public Land Mobile Network (PLMN). The SNPN network may support the terminal to access using an "external subscription", that is, the user subscription of the terminal is owned by an external entity (e.g., a Mobile Network Operator (MNO)) independent of the SNPN network, and the SNPN network allows such a terminal to access the SNPN using the external subscription.
In the prior art, a UE may perform subscription authentication with a PLMN network, and if an SNPN network wants to utilize information such as subscription authentication of the UE on the PLMN network, or request the PLMN to process a PDU session, the SNPN network interacts with a target network element/Network Function (NF) of the PLMN network, but the SNPN is a private network, which is not high in trustworthiness for the PLMN network, and the SNPN is very large in number. In the prior art, a PLMN network has no better solution when the SNPN network requests to process UE information.
Disclosure of Invention
The communication method is beneficial to improving the safety and stability of the PLMN network and reducing the impact and influence of a plurality of SNPN networks on the PLMN network.
In a first aspect, a communication method is provided, the method including: a first agent in a first Public Land Mobile Network (PLMN) receives a first request message sent by a first network element of an independent non-public network (SNPN), wherein the first request message is used for requesting the first PLMN to process and provide service for first terminal equipment, and the first request message comprises an identifier of the first terminal equipment, network element type information of a second network element in the first PLMN, which processes the first request message, and an identifier of the SNPN; the first agent determines the second network element according to the first request message; the first agent sends a second request message to the second network element, where the second request message is used to request the second network element to provide service for the first terminal device, and the second request message includes an identifier of the first terminal device; the first agent receives a first response message sent by the second network element, wherein the first response message comprises a processing result of the second network element; the first proxy forwards the first response message to the first network element.
By arranging the NPN proxy in the PLMN network, the request message of the SNPN network is forwarded to the target network element through the NPN proxy, thereby being beneficial to improving the safety and stability of the PLMN network and reducing the impact and influence of a plurality of SNPN networks on the PLMN network.
With reference to the first aspect, in certain implementations of the first aspect, the first agent sends a third request message to a network function repository function NRF of the first PLMN, the third request message including network element type information of the second network element; and the first agent receives a second response message sent by the NRF, wherein the response message comprises the ID of the second network element and/or the address of the second network element.
With reference to the first aspect, in certain implementations of the first aspect, the second response message includes an ID and/or an address of at least one candidate network element, and the method further includes: the first agent selects one of the at least one candidate network element as the second network element.
With reference to the first aspect, in some implementation manners of the first aspect, the first agent stores a correspondence between a type of the second network element, an ID or an address of the second network element, and an identifier of the SNPN and an identifier of the first terminal device.
By storing the type of the second element, the ID or address of the second network element, and the correspondence between the SNPN identifier and the identifier of the first terminal device, when the NPN proxy receives a similar request again, the second network element can be quickly selected according to the locally stored correspondence.
With reference to the first aspect, in some implementations of the first aspect, before the first agent sends the second request message to the second network element, the method further includes: the first agent takes the address of the first agent as the first source address of the second request message; the first agent takes the address of the second network element as the first target address of the second request message.
By replacing the source address in the request message with the proxy address, the network element address of the private network is effectively ensured not to be known by the public network, and the privacy and the safety of the private network are protected.
With reference to the first aspect, in some implementations of the first aspect, before the first proxy sends the first response message to the first network element, the method further includes: the first agent takes the address of the first agent as a second source address of the first response message; the first proxy takes the address of the first network element as the second target address of the first response message.
By replacing the source address in the response message with the address of the first agent, the network element address of the public network is effectively ensured not to be known by the private network, and the privacy and the safety of the public network are protected.
In a second aspect, a communication method is provided, the method comprising: a first agent in a first Public Land Mobile Network (PLMN) receives a fourth request message sent by a first network element of an independent non-public network (SNPN), wherein the fourth request message is used for requesting the first PLMN to process a first terminal device of the SNPN, and comprises an identifier of the first terminal device, network element type information of a second network element in the first PLMN, which processes the fourth request message, and an identifier of the SNPN; the first agent rejects the fourth request message of the SNPN according to the network element type information of the second network element.
With reference to the second aspect, in some implementations of the second aspect, the network element type information of the second network element is a network function repository function NRF.
When the network element type information is NRF, the safety of the PLMN network element is improved by rejecting the SNPN request message.
In a third aspect, a communication method is provided, the method including: a first network element of an independent non-public network (SNPN) sends a first request message to a first agent of a first public land network (PLMN), wherein the first request message is used for requesting the first PLMN to provide service for a first terminal device, and comprises an identifier of the first terminal device, network element type information of a second network element which processes the first request message in the first PLMN and the identifier of the SNPN; and the first network element receives a first response message sent by the first agent, wherein the first response message comprises a processing result of the first PLMN.
By arranging the NPN proxy in the PLMN network, the interaction request message of the SNPN network is forwarded to the target network element through the NPN proxy, so that the safety and the stability of the PLMN network are improved, and the impact and the influence of a plurality of SNPN networks on the PLMN network are reduced.
With reference to the third aspect, in some implementation manners of the third aspect, the first network element determines, according to the identifier of the first terminal device, an ID of the first PLMN, and acquires, according to the ID of the first PLMN, an address of the first agent; the first network element sends the first request message to the first agent according to the address of the first agent.
With reference to the third aspect, in some implementations of the third aspect, the first network element is an AMF or an SMF, and before the first network element sends the first request message to the first proxy, the method further includes: the first network element sends a second request message to a network function repository function NRF of the SNPN, where the second request message is used to request to acquire an address of the first agent, and the second request message includes the first PLMN ID; and the first network element receives a second response message sent by the NRF, wherein the second response message comprises the address of the first agent.
With reference to the third aspect, in certain implementations of the third aspect, the second response message further includes first proxy indication information, where the first proxy indication information is used to instruct the first network element to send the first request message to the first proxy.
With reference to the third aspect, in some implementations of the third aspect, the first network element is an AMF or an SMF, and before the first network element sends the first request message to the first proxy, the method further includes: and the first network element determines the ID of the first PLMN according to the identifier of the first terminal equipment, and acquires the address of the first agent according to the ID of the first PLMN.
With reference to the third aspect, in some implementations of the third aspect, the first network element is a V-SMF or a V-PCF, and before the first network element sends the first request message to the first proxy, the method further includes: receiving a third request message sent by the AMF, wherein the third request message comprises the address of the first agent.
With reference to the third aspect, in some implementations of the third aspect, the first network element is a V-SMF or a V-PCF, and before the first network element sends the first request message to the first proxy, the method further includes: receiving a fourth request message sent by the AMF, where the fourth request message is used for the first network element to obtain the address of the first agent, and the fourth request message includes an identifier of the first terminal device; and the first network element determines the ID of the first PLMN according to the identifier of the first terminal equipment, and acquires the address of the first agent according to the ID of the first PLMN.
With reference to the third aspect, in certain implementations of the third aspect, the fourth request message further includes second proxy indication information, where the second proxy indication information is used to instruct the first network element to send the first request message to the first proxy.
With reference to the third aspect, in some implementations of the third aspect, before the first network element is a second proxy and the first network element sends the first request message to the first proxy, the method further includes: the first network element receives a fifth request message sent by an AMF, an SMF or a V-PCF, wherein the fifth request message is used for the first network element to acquire the address of the first agent, and the fifth request message comprises the identifier of the first terminal equipment; and the first network element determines the ID of the first PLMN according to the identifier of the first terminal equipment, and acquires the address of the first agent according to the ID of the first PLMN.
With reference to the third aspect, in some implementations of the third aspect, the obtaining the address of the first agent according to the first PLMN ID includes: and acquiring the address of the first agent according to the first PLMN ID and local configuration, wherein the local configuration comprises the corresponding relation between the first PLMN ID and the address of the first agent.
In a fourth aspect, a communication method is provided, where the method includes sending, to a second proxy of an independent non-public network SNPN, a first request message, where the first request message is used to request a first PLMN to process a first terminal device of the SNPN, and the first request message includes an identifier of the first terminal device, network element type information of a second network element in the first PLMN, where the second network element processes the first request message, and an identifier of the SNPN; and the third network element receives a first response message sent by the second agent, wherein the first response message comprises a result of the first PLMN processing the first terminal equipment.
By sending the SNPN request message to the second agent instead of directly to the target network element of the PLMN network, the address of the SNPN network element can be ensured not to be known by the PLMN, and the safety of the SNPN network is protected.
With reference to the fourth aspect, in some implementations of the fourth aspect, the third network element obtains the address of the second agent according to a local configuration; the third network element sends the first request message to a second agent according to the address of the second agent.
With reference to the fourth aspect, in some implementations of the fourth aspect, before the third network element is an AMF or an SMF, and before the third network element sends the first request message to the second proxy of the SNPN, the method further includes: the third network element sends a second request message to a network function repository function NRF of the SNPN, wherein the second request message is used for requesting to acquire an address of the second agent; and the third network element receives a second response message sent by the NRF, wherein the second response message comprises the address of the second agent.
With reference to the fourth aspect, in some implementations of the fourth aspect, the second response message further includes first proxy indication information, where the first proxy indication information is used to instruct the third network element to send the first request message to the second agent.
With reference to the fourth aspect, in some implementations of the fourth aspect, the third network element is a V-SMF or a V-PCF, and before the third network element sends the first request message to the second agent, the method further includes: receiving a third request message sent by the AMF, wherein the third request message comprises the address of the second agent.
In a fifth aspect, a communication apparatus is provided, the apparatus comprising: a first receiving module, configured to receive a first request message sent by a first network element of an independent non-public network SNPN, where the first request message is used to request a first PLMN to provide a service for a first terminal device, and the first request message includes an identifier of the first terminal device, network element type information of a second network element in the first PLMN, where the second network element processes the first request message, and an identifier of the SNPN; a first processing module, configured to determine the second network element according to the first request message; a first sending module, configured to send a second request message to the second network element, where the second request message is used to request the second network element to provide a service for the first terminal device, and the second request message includes an identifier of the first terminal device; the first receiving module is further configured to receive a first response message sent by the second network element, where the first response message includes a result of the second network element processing the first terminal device; the first sending module is further configured to forward the first response message to the first network element.
By arranging the NPN proxy in the PLMN network, the interaction request message of the SNPN network is forwarded to the target network element through the NPN proxy, so that the safety and the stability of the PLMN network are improved, and the impact and the influence of a large number of SNPN networks on the PLMN network are reduced.
With reference to the fifth aspect, in some implementations of the fifth aspect, the sending module is further configured to: sending a third request message to a network function repository function NRF of the first PLMN, the third request message including network element type information of the second network element; the first receiving module is further configured to: and receiving a second response message sent by the NRF, wherein the response message comprises the ID of the second network element and/or the address of the second network element.
With reference to the fifth aspect, in some implementations of the fifth aspect, the second response message includes an ID and/or an address of at least one candidate network element, and the first processing module is further configured to: selecting one of said at least one candidate network element as said second network element.
With reference to the fifth aspect, in certain implementations of the fifth aspect, the apparatus further comprises: a storage module, configured to store a correspondence between a type of the second network element, an ID or an address of the second network element, and the identifier of the SNPN and the identifier of the first terminal device.
By storing the type of the second element, the ID or address of the second network element, and the correspondence between the SNPN identifier and the identifier of the first terminal device, the NPN proxy can quickly respond according to the locally stored correspondence when it receives a similar request again.
With reference to the fifth aspect, in some implementations of the fifth aspect, the first processing module is further configured to: taking the address of the communication device as a first source address of the second request message; the communication device takes the address of the second network element as the first target address of the second request message.
The source address in the request message is replaced by the proxy address, so that the private network element address is effectively ensured not to be known by the public network, and the privacy security of the private network is protected.
With reference to the fifth aspect, in some implementations of the fifth aspect, the first processing module is further configured to: the communication device takes the address of the communication device as a second source address of the first response message; the communication device takes the address of the first network element as the second target address of the first response message.
By replacing the source address in the response message with the address of the first agent, the network element address of the public network is effectively ensured not to be known by the private network, and the privacy and the safety of the public network are protected.
In a sixth aspect, there is provided a communication apparatus, the apparatus comprising: a second receiving module, configured to receive a fourth request message sent by a first network element of an independent non-public network SNPN, where the fourth request message is used to request a first PLMN to process a first terminal device of the SNPN, and the fourth request message includes an identifier of the first terminal device, network element type information of a second network element in the first PLMN, where the second network element processes the fourth request message, and an identifier of the SNPN; a second processing module, configured to reject the fourth request message of the SNPN according to the network element type information of the second network element.
With reference to the sixth aspect, in some implementations of the sixth aspect, the network element type information of the second network element is a network function repository function NRF.
When the network element type information is NRF, the safety of the PLMN network element is improved by rejecting the SNPN request message.
In a seventh aspect, a communication apparatus is provided, the apparatus comprising: a third sending module, configured to send a first request message to a first agent of a first public land network PLMN, where the first request message is used to request the first PLMN to provide a service for a first terminal device, and the first request message includes an identifier of the first terminal device, network element type information of a second network element in the first PLMN, where the second network element processes the first request message, and an identifier of the SNPN; a third receiving module, configured to receive a first response message sent by the first agent, where the first response message includes a processing result of the first PLMN.
By arranging the NPN proxy in the PLMN network, the interaction request message of the SNPN network is forwarded to the target network element through the NPN proxy, so that the safety and the stability of the PLMN network are improved, and the impact and the influence of a plurality of SNPN networks on the PLMN network are reduced.
With reference to the seventh aspect, in certain implementations of the seventh aspect, the apparatus further includes: a third processing module, configured to determine an ID of the first PLMN according to the identifier of the first terminal device, and obtain an address of the first agent according to the ID of the first PLMN; the third sending module is further configured to: sending the first request message to the first agent according to the address of the first agent.
With reference to the seventh aspect, in some implementations of the seventh aspect, the communication device is an AMF or an SMF, and the third sending module is further configured to: sending a second request message to a network function repository function NRF of the SNPN, the second request message being used for requesting to acquire an address of the first agent, the second request message including an ID of the first PLMN; the third receiving module is further configured to: and receiving a second response message sent by the NRF, wherein the second response message comprises the address of the first agent.
With reference to the seventh aspect, in certain implementations of the seventh aspect, the second response message further includes first proxy indication information, where the first proxy indication information is used to instruct the communication apparatus to send the first request message to the first proxy.
With reference to the seventh aspect, in some implementations of the seventh aspect, the first network element is an AMF or an SMF, and the third processing module is further configured to: and determining the ID of the first PLMN according to the identifier of the first terminal equipment, and acquiring the address of the first agent according to the ID of the first PLMN.
With reference to the seventh aspect, in some implementations of the seventh aspect, the communication device is a V-SMF or a V-PCF, and the third receiving module is further configured to: receiving a third request message sent by the AMF, wherein the third request message comprises the address of the first agent.
With reference to the seventh aspect, in some implementations of the seventh aspect, the communication device is a V-SMF or a V-PCF, and the third receiving module is further configured to: receiving a fourth request message sent by the AMF, wherein the fourth request message is used for the communication device to acquire the address of the first agent, and the fourth request message comprises the identifier of the first terminal equipment; the third processing module is used for: and determining the ID of the first PLMN according to the identifier of the first terminal equipment, and acquiring the address of the first agent according to the ID of the first PLMN.
With reference to the seventh aspect, in certain implementations of the seventh aspect, the fourth request message further includes second agent indication information, where the second agent indication information is used to instruct the communication apparatus to send the first request message to the first agent.
With reference to the seventh aspect, in some implementations of the seventh aspect, the communication device is a second agent, and the third receiving module is further configured to: receiving a fifth request message sent by the AMF, the SMF or the V-PCF, wherein the fifth request message is used for the communication device to acquire the address of the first agent, and the fifth request message comprises the identifier of the first terminal equipment; the third processing module is used for processing the data; and determining the ID of the first PLMN according to the identifier of the first terminal equipment, and acquiring the address of the first agent according to the ID of the first PLMN.
With reference to the seventh aspect, in certain implementations of the seventh aspect, the third processing module is further configured to: and acquiring the address of the first agent according to the first PLMN ID and local configuration, wherein the local configuration comprises the corresponding relation between the first PLMN ID and the address of the first agent.
In an eighth aspect, there is provided a communication apparatus, the apparatus comprising: a fourth sending module, configured to send a first request message to a second proxy of an SNPN, where the first request message is used to request a first PLMN to process a first terminal device of the SNPN, and the first request message includes an identifier of the first terminal device, network element type information of a second network element in the first PLMN, where the second network element processes the first request message, and an identifier of the SNPN; a fourth receiving module, configured to receive a first response message sent by the second agent, where the first response message includes a result of the first PLMN processing the first terminal device.
By sending the SNPN request message to the second agent instead of directly to the target network element of the PLMN network, the address of the SNPN network element can be ensured not to be known by the PLMN, and the safety of the SNPN network is protected.
With reference to the eighth aspect, in some implementation manners of the eighth aspect, the apparatus further includes a fourth processing module, configured to obtain an address of the second agent according to a local configuration; the fourth sending module is further configured to: sending the first request message to a second agent according to the address of the second agent.
With reference to the eighth aspect, in some implementations of the eighth aspect, the communication device is an AMF or an SMF, and the fourth sending module is further configured to: sending a second request message to a network function repository function NRF of the SNPN, the second request message being used for requesting to acquire an address of the second agent; the fourth receiving module is further configured to: receiving a second response message sent by the NRF, wherein the second response message comprises the address of the second agent.
With reference to the eighth aspect, in some implementations of the eighth aspect, the second response message further includes first proxy indication information for indicating the communication apparatus to send the first request message to the second agent.
With reference to the eighth aspect, in some implementations of the eighth aspect, the communication device is a V-SMF or a V-PCF, and the fourth receiving module is further configured to: receiving a third request message sent by the AMF, wherein the third request message comprises the address of the second agent.
In a ninth aspect, there is provided a communication apparatus having a function of implementing the method of the first aspect. The function can be realized by hardware, and can also be realized by hardware executing corresponding software. The hardware or software includes one or more modules corresponding to the functions described above.
In a tenth aspect, there is provided a communication apparatus having a function of implementing the method of the second aspect. The function can be realized by hardware, and can also be realized by executing corresponding software by hardware. The hardware or software includes one or more modules corresponding to the functions described above.
In an eleventh aspect, there is provided a communication apparatus having a function of implementing the method of the third aspect. The function can be realized by hardware, and can also be realized by executing corresponding software by hardware. The hardware or software includes one or more modules corresponding to the functions described above.
In a twelfth aspect, a communication device is provided, which has the function of implementing the method of the fourth aspect. The function can be realized by hardware, and can also be realized by hardware executing corresponding software. The hardware or software includes one or more modules corresponding to the functions described above.
In a thirteenth aspect, there is provided a communication apparatus comprising a processor, a memory for storing a computer program, and the processor being configured to invoke and run the computer program from the memory, so that the communication device performs the method of the first aspect and its various possible implementations.
In a fourteenth aspect, a communication apparatus is provided, which comprises a processor and a memory, wherein the memory is used for storing a computer program, and the processor is used for calling and running the computer program from the memory, so that the communication device executes the method in the second aspect and various possible implementation manners thereof.
In a fifteenth aspect, there is provided a communication apparatus comprising a processor, a memory for storing a computer program, and the processor being configured to invoke and run the computer program from the memory, so that the communication device performs the methods of the third aspect and its various possible implementations.
In a sixteenth aspect, there is provided a communication apparatus comprising a processor, a memory for storing a computer program, and the processor being configured to invoke and run the computer program from the memory, so that the communication device performs the methods of the fourth aspect and its various possible implementations.
In a seventeenth aspect, a communication apparatus is provided, including: a processor; the processor is configured to be coupled to the memory and to perform the method according to any one of the above first aspects after reading the instructions in the memory.
In an eighteenth aspect, there is provided a communication apparatus comprising: a processor; the processor is configured to be coupled to the memory, and after reading the instructions in the memory, perform the method according to the instructions as described in any one of the above second aspects.
In a nineteenth aspect, there is provided a communication apparatus comprising: a processor; the processor is configured to be coupled to the memory, and after reading the instructions in the memory, perform the method according to any one of the third aspects.
In a twentieth aspect, there is provided a communication apparatus comprising: a processor; the processor is configured to be coupled to the memory, and after reading the instructions in the memory, execute the method according to any one of the above fourth aspects.
In a twenty-first aspect, there is provided a communication apparatus comprising: a processor and an interface circuit, which may be a code/data read/write interface circuit, for receiving and transmitting computer-executable instructions (stored in, possibly read directly from, or possibly via other devices) to the processor; the processor is configured to execute the computer-executable instructions to perform the method of any one of the first aspect.
In a twenty-second aspect, there is provided a communication apparatus comprising: a processor and an interface circuit, which may be a code/data read/write interface circuit, for receiving and transmitting computer-executable instructions (stored in, possibly read directly from, or possibly via other devices) to the processor; the processor is configured to execute the computer-executable instructions to perform the method of any of the second aspects.
In a twenty-third aspect, there is provided a communication apparatus comprising: a processor and an interface circuit, which may be a code/data read/write interface circuit, for receiving and transmitting computer-executable instructions (stored in, possibly read directly from, or possibly via other devices) to the processor; the processor is configured to execute the computer-executable instructions to perform the method of any of the third aspects.
A twenty-fourth aspect provides a communication apparatus comprising: a processor and an interface circuit, which may be a code/data read/write interface circuit, for receiving and transmitting computer-executable instructions (stored in, possibly read directly from, or possibly via other devices) to the processor; the processor is configured to execute the computer-executable instructions to perform the method of any of the fourth aspects.
In a twenty-fifth aspect, there is provided an apparatus (which may be a system-on-chip, for example) comprising a processor for enabling a communication apparatus to carry out the functions referred to in the above first aspect. In one possible design, the device further includes a memory for storing program instructions and data necessary for the communication device. When the device is a chip system, the device may be composed of a chip, or may include a chip and other discrete devices.
In a twenty-sixth aspect, there is provided an apparatus (which may be a system-on-chip, for example) comprising a processor for enabling a communication apparatus to implement the functionality referred to in the second aspect above. In one possible design, the device further includes a memory for storing program instructions and data necessary for the communication device. When the device is a chip system, the device may be composed of a chip, or may include a chip and other discrete devices.
In a twenty-seventh aspect, there is provided an apparatus (which may be a system-on-chip, for example) comprising a processor for enabling a communication apparatus to implement the functionality referred to in the above third aspect. In one possible design, the device further includes a memory for storing program instructions and data necessary for the communication device. When the device is a chip system, the device may be formed by a chip, and may also include a chip and other discrete devices.
In a twenty-eighth aspect, there is provided an apparatus (which may be a system-on-chip, for example) comprising a processor for enabling a communication apparatus to implement the functionality referred to in the above third aspect. In one possible design, the device further includes a memory for storing program instructions and data necessary for the communication device. When the device is a chip system, the device may be composed of a chip, or may include a chip and other discrete devices.
A twenty-ninth aspect provides a computer-readable storage medium for storing a computer program comprising instructions for performing the method as in the first aspect or any possible implementation manner of the first aspect.
A thirty-first aspect provides a computer-readable storage medium for storing a computer program comprising instructions for performing the method as in the second aspect or any possible implementation of the second aspect.
In a thirty-first aspect, there is provided a computer-readable storage medium for storing a computer program comprising instructions for performing a method as in the third aspect or any possible implementation of the third aspect.
A thirty-second aspect provides a computer-readable storage medium for storing a computer program comprising instructions for performing a method as in the fourth aspect or any possible implementation of the fourth aspect.
A thirty-third aspect provides a computer program product comprising a computer program which, when run on a computer device, causes the computer device to perform the method of the first aspect.
A thirty-fourth aspect provides a computer program product comprising a computer program which, when run on a computer device, causes the computer device to perform the method according to the second aspect.
A thirty-fifth aspect provides a computer program product comprising a computer program which, when run on a computer device, causes the computer device to perform the method according to the third aspect.
A thirty-sixth aspect provides a computer program product comprising a computer program which, when run on a computer device, causes the computer device to perform the method of the fourth aspect.
A thirty-seventh aspect provides a communication system comprising a first agent and a first network element. The first agent is configured to perform the steps performed by the first agent in the first aspect or the scheme provided in the embodiment of the present application; the first network element is configured to perform the steps performed by the mobility management network element in the third aspect or the scheme provided in the embodiment of the present application.
In a possible design, the communication system may further include a second agent, and the second agent is configured to perform the steps performed by the second agent in the fourth aspect or the scheme provided in the embodiment of the present application.
In a possible design, the communication system may further include other devices, such as a third network element, for interacting with the first agent, the first network element, or the second agent in the solution provided in this embodiment of the application, which is not specifically limited in this embodiment of the application.
These and other aspects of the present application will be more readily apparent from the following description of the embodiments.
Drawings
Fig. 1 is a schematic diagram of a 5G mobile communication system architecture.
Fig. 2 is a schematic diagram of a communication method according to an embodiment of the present application.
Fig. 3 is a schematic diagram of another communication method according to an embodiment of the present application.
Fig. 4 is a schematic diagram of another communication method according to an embodiment of the present application.
Fig. 5 is a schematic diagram of another communication method according to an embodiment of the present application.
Fig. 6 is a schematic diagram of an interworking architecture between SNPN and PLMN networks according to an embodiment of the present application.
Fig. 7 is a schematic diagram of another SNPN and PLMN network interworking architecture according to an embodiment of the present application.
Fig. 8 is a schematic network interaction flow diagram according to an embodiment of the present application.
Fig. 9 is a schematic diagram of another network interaction flow according to an embodiment of the present application.
Fig. 10 is a schematic diagram of another network interaction flow according to an embodiment of the present application.
Fig. 11 is a schematic diagram of another network interaction flow according to an embodiment of the present application.
Fig. 12 is a schematic diagram of a communication device according to an embodiment of the present application.
Fig. 13 is a schematic diagram of another communication device according to an embodiment of the present application.
Fig. 14 is a schematic diagram of another communication device according to an embodiment of the present application.
Fig. 15 is a schematic diagram of another communication device according to an embodiment of the present application.
Fig. 16 is a schematic diagram of another communication device according to an embodiment of the present application.
Fig. 17 is a schematic diagram of another communication device according to an embodiment of the present application.
Fig. 18 is a schematic diagram of another communication device according to an embodiment of the present application.
Detailed Description
The technical solution in the present application will be described below with reference to the accompanying drawings.
The technical scheme of the embodiment of the application can be applied to various communication systems, for example: a global system for mobile communication (GSM) system, a Code Division Multiple Access (CDMA) system, a Wideband Code Division Multiple Access (WCDMA) system, a General Packet Radio Service (GPRS), a long term evolution (long term evolution, LTE) system, a LTE Frequency Division Duplex (FDD) system, a LTE Time Division Duplex (TDD) system, a universal mobile telecommunications system (universal mobile telecommunications system, UMTS), a Worldwide Interoperability for Microwave Access (WiMAX) communication system, a fifth generation (5G) system or a new radio system (UMTS), future evolution (NR), and the like.
Please refer to fig. 1, which is a schematic diagram of a network architecture of a communication system applicable to an embodiment of the present application, where the network architecture includes a terminal device, an access network device, an access management network element, a session management network element, a user plane network element, a policy control network element, a network slice selection network element, a network warehouse function network element, a network data analysis network element, a unified data management network element, a unified data storage network element, an authentication service function network element, a network capability opening network element, an application function network element, and a Data Network (DN) connected to an operator network. The terminal equipment can send service data to the data network through the access network equipment and the user plane network element, and receive the service data from the data network.
The terminal equipment has a wireless transceiving function, can be deployed on land and comprises an indoor or outdoor, handheld, wearable or vehicle-mounted terminal; can also be deployed on the water surface (such as a ship and the like); the terminal device may be a mobile phone (mobile phone), a tablet (Pad), a computer with wireless transceiving function, a Mobile Internet Device (MID), a wearable device, a Virtual Reality (VR) terminal device, an Augmented Reality (AR) terminal device, a wireless terminal in industrial control (industrial control), a wireless terminal in unmanned driving, a wireless terminal in remote medical (remote medical), a wireless terminal in smart grid, a wireless terminal in transportation security, a wireless terminal in smart city, a wireless terminal in home application field, etc . The terminal device may also be referred to as User Equipment (UE), a mobile station, a remote station, and the like, and the embodiments of the present application do not limit the specific technology, the device form, and the name adopted by the terminal device.
An access network device is a device in a network for accessing a terminal device to a wireless network. The access network device may be a node in a radio access network, which may also be referred to as a base station, and may also be referred to as a Radio Access Network (RAN) node (or device). The network device may include an evolved Node B (NodeB or eNB or e-NodeB) in a Long Term Evolution (LTE) system or an evolved LTE system (LTE-Advanced, LTE-a), such as a conventional macro base station eNB and a micro base station eNB in a heterogeneous network scenario, or may also include a next generation Node B (gNB) in a fifth generation mobile communication technology (5th generation, 5G) New Radio (NR) system, or may also include a radio network controller (radio network controller, RNC), Node B (NB), a base station controller (base station controller, BSC), a base transceiver station (base transceiver station, BTS), a Transmission Reception Point (TRP), a home base station (e.g., a home base station, base station B, base station unit, HNB, BBU), a baseband pool BBU port, or a WiFi Access Point (AP), and further may further or may further include a Centralized Unit (CU) and a Distributed Unit (DU) in a cloud access network (cloudlen) system, which is not limited in the embodiment of the present application. In a scenario of separate deployment of an access network device including a CU and a DU, the CU supports Radio Resource Control (RRC), Packet Data Convergence Protocol (PDCP), Service Data Adaptation Protocol (SDAP), and other protocols; the DU mainly supports a Radio Link Control (RLC), a Medium Access Control (MAC) and a physical layer protocol.
An access management network element, which is mainly used for the attachment of a terminal in a mobile network, mobility management, and tracking area update processes, terminates a Non Access Stratum (NAS) message, completes registration management, connection management, reachability management, tracking area list (TA list) allocation, mobility management, and the like, and transparently routes a Session Management (SM) message to the session management network element. In a fifth generation (5G) communication system, the access management network element may be an access and mobility management function (AMF), and in a future communication system (e.g. a 6G communication system), the mobility management network element may still be an AMF network element, or may also have other names, which is not limited in this application.
The session management network element is mainly used for session management in a mobile network, such as session establishment, modification and release. The specific functions include allocating an Internet Protocol (IP) address to the terminal, selecting a user plane network element providing a message forwarding function, and the like. In the 5G communication system, the session management network element may be a Session Management Function (SMF), and in a future communication system (e.g. a 6G communication system), the session management network element may still be an SMF network element, or may also have another name, which is not limited in this application.
The user plane network element is mainly used for processing user messages, such as forwarding, charging, legal monitoring and the like. The user plane network element may also be referred to as a Protocol Data Unit (PDU) session anchor (PSA). In a 5G communication system, the user plane network element may be a User Plane Function (UPF), and in a future communication system (e.g., a 6G communication system), the user plane network element may still be a UPF network element, or may also have other names, which is not limited in this application.
The policy control network element includes a user subscription data management function, a policy control function, a charging policy control function, quality of service (QoS) control, and the like. In a 5G communication system, the policy control network element may be a Policy Control Function (PCF), and in a future communication system (e.g. a 6G communication system), the policy control network element may still be a PCF network element, or may also have other names, which is not limited in this application.
The network slice selection function network element is mainly used for selecting a proper network slice for the service of the terminal equipment. In a 5G communication system, the network slice selection element may be a Network Slice Selection Function (NSSF) element, and in a future communication system (for example, a 6G communication system), the network slice selection element may still be an NSSF element, or may also have other names, which is not limited in this application.
The network warehouse function network element is mainly used for providing registration and discovery functions of the network element or services provided by the network element. In the 5G communication system, the network warehouse function network element may be a network warehouse function (NRF), and in a future communication system (e.g. 6G communication system), the network warehouse function network element may still be an NRF network element, or may also have other names, which is not limited in this application.
The network data analysis network element may collect data from various Network Functions (NF), such as a policy control network element, a session management network element, a user plane network element, an access management network element, and an application function network element (through a network capability open function network element), and perform analysis and prediction. In a 5G communication system, the network data analysis network element may be a network data analysis function (NWDAF), and in a future communication system (for example, a 6G communication system), the network data analysis network element may still be an NWDAF network element, or may also have another name, which is not limited in this application.
And the unified data management network element is mainly used for managing the subscription information of the terminal equipment. In the 5G communication system, the unified data management network element may be a Unified Data Management (UDM), and in a future communication system (e.g. a 6G communication system), the unified data management network element may still be a UDM network element, or may also have other names, which is not limited in this application.
The unified data storage network element is mainly used for storing structured data information, wherein the structured data information comprises subscription information, strategy information and network data or service data defined by a standard format. In the 5G communication system, the unified data storage network element may be a unified data storage (UDR), and in a future communication system (for example, a 6G communication system), the unified data storage network element may still be a UDR network element, or may also have other names, which is not limited in this application.
And the authentication service function network element is mainly used for carrying out security authentication on the terminal equipment. In the 5G communication system, the authentication service function network element may be an authentication server function (AUSF), and in a future communication system (e.g., a 6G communication system), the authentication service function network element may still be an AUSF network element, or may also have other names, which is not limited in this application.
The network capability is opened, and part of the functions of the network can be exposed to the application in a controlled manner. In a 5G communication system, the network capability openness element may be a network capability openness function (NEF), and in a future communication system (for example, a 6G communication system), the network capability openness element may still be a NEF element, or may also have another name, which is not limited in this application.
The application function network element may provide service data of various applications to a control plane network element of a communication network of an operator, or obtain data information and control information of the network from the control plane network element of the communication network. In a 5G communication system, an application function network element may be an Application Function (AF), and in a future communication system (for example, a 6G communication system), the application function network element may still be an AF network element, or may also have another name, which is not limited in this application.
The data network is mainly used for providing data transmission service for the terminal equipment. The data network may be a private network, such as a local area network, a Public Data Network (PDN) network, such as the Internet (Internet), or a private network co-deployed by an operator, such as an IP multimedia network subsystem (IMS) service.
It should be understood that the above network elements or functions may be network elements in a hardware device, or may be software functions running on dedicated hardware, or virtualization functions instantiated on a platform (e.g., a cloud platform). Optionally, the network element or the function may be implemented by one device, or may be implemented by multiple devices together, or may be a functional module in one device, which is not specifically limited in this embodiment of the present application.
For convenience of description, in the following description, an access management network element is an AMF network element, a session management network element is an SMF network element, a policy control network element is a PCF network element, a network warehouse function network element is an NRF network element, a unified data management network element is an UDM network element, and an authentication service function network element is an AUSF network element, which are taken as examples. Further, the AMF network element is abbreviated as AMF, the PCF network element is PCF, the NRF network element is NRF, the UDM network element is UDM, and the AUSF network element is AUSF. That is, AMFs described later in this application may be replaced with access management network elements, PCFs may be replaced with policy control network elements, NRFs may be replaced with network warehouse function network elements, UDMs may be replaced with the same data management network elements, and AUSFs may be replaced with authentication service function network elements. Currently, the fifth generation mobile communication technology is in a period of vigorous development, and a 5G mobile communication system architecture includes User Equipment (UE), a Radio Access Network (RAN), a Core network and a Data Network (DN). Such as the 5G system architecture diagram shown in fig. 1.
The non-public network NPN is a non-public 5G network, and may implement public network integrated NPN (public network integrated NPN) depending on support of a PLMN, or implement independent NPN (stand alone NPN, SNPN) deployment without depending on network functions of the PLMN.
The SNPN network is deployed independently, and may be identified by using PLMN ID + NID, where the NID is a network identifier, and the PLMN ID may be an inherent value reserved by a third-party operator or a specific value of a PLMN operator that deploys the SNPN. In the SNPN network, a cell broadcasts a PLMN ID + NID, and the UE selects an accessed NPN network according to the broadcast information and the configured network selection information. If the UE finds that the configured network selection information (PLMN ID + NID1) is not the same as the PLMN ID broadcast by the network or PLMN ID + NID2, the UE does not select its access.
The SNPN network may support the terminal to access using an "external subscription", that is, the user subscription of the terminal is owned by an external entity (e.g., a Mobile Network Operator (MNO)) independent of the SNPN network, and the SNPN network allows such a terminal to access the SNPN using the external subscription.
In the prior art, the UE may perform subscription authentication with the PLMN network, and if the SNPN network wants to utilize information such as subscription authentication of the UE in the PLMN network, or request the PLMN to process a PDU session, the SNPN network interacts with the target NF of the PLMN network, but the SNPN network is a private network, so that the PLMN network is not high in trustworthiness, and the SNPN is very large in number. In the prior art, a PLMN network has no better solution when the SNPN network requests to process UE information.
The embodiment of the application provides a communication method, wherein a network element of an SNPN network transmits a request message for processing UE information to an NPN proxy of a PLMN network, and forwards the request message to a target network element of the PLMN network through the NPN proxy, so that interaction between the SNPN network and the PLMN network is realized, the request message is forwarded through the NPN proxy, the safety of the PLMN network can be effectively protected, and meanwhile, the influence of the SNPN network on the PLMN network can be shielded. Furthermore, the SNPN network can also set a PLMN proxy, and the request message sent by the network element of the SNPN is concentrated to the PLMN proxy and then forwarded, so that the configuration of the SNPN/PLMN can be further reduced, and the influence of the change of the PLMN network on the SNPN network can be shielded.
Fig. 2 shows a schematic diagram of a communication method according to an embodiment of the present application. As shown in fig. 2, the method 200 includes steps S210 to S250, which are described in detail below.
S210, a first agent in a first public land mobile network PLMN receives a first request message sent by a first network element of an independent non-public network SNPN.
As an embodiment, the first request message is used to request the first PLMN to provide a service for the first terminal device, and the first request message includes an identifier of the first terminal device, network element type information of a second network element in the first PLMN, which processes the first request message, and an identifier of the SNPN. The service requested by the first PLMN to provide for the first terminal device may be any one or more of the following:
signing service: the PLMN provides subscription information (including AM subscription or SM subscription) of the first terminal device in the PLMN. For example, the AMF of SNPN requests AM subscription from the PLMN or the SMF of SNPN requests SM subscription from the PLMN. And the network element type information of the second network element corresponding to the signed service is the UDM type.
And authentication service, wherein the PLMN provides authentication and authorization of the first terminal, such as identity authentication, service authorization, data encryption and integrity protection service. And the network element type information of the second network element corresponding to the authentication service is AUSF type.
Policy service: the PLMN provides policy information of the first terminal, such as monitoring and control policies, charging policies, access and mobility policies, etc. And the network element type information of the second network element corresponding to the policy service is the PCF type.
Conversation service: the PLMN provides session management for the first terminal, such as session path management, session QoS management, routing rule management for the session, address management for the session, etc. And the network element type information of the second network element corresponding to the session service is the SMF type.
The first request message is used to request the PLMN network to process a first terminal device that wants to access the SNPN, where the first network element may be an AMF or an SMF, and the corresponding request for processing may be: in the registration process, the AMF and the PLMN AUSF interactively authenticate the UE, and the AMF acquires a subscription from the PLMN UDM; in the session process, the SMF acquires a subscription from the PLMN UDM, and the V-SMF and the H-SMF interactively configure session resources; and in the UE policy association process, the V-PCF interacts with the H-PCF, and the like, which is not limited in the application.
The identifier of the first terminal device may be a user permanent identifier (SUPI)/user encrypted identifier (SUCI). The network element type information may be an NF type.
Optionally, the first request message may further include an ID of the first PLMN, a routing indicator (routing indicator), and the like. Optionally, the AMF may determine the ID of the first PLMN according to the identity of the UE.
The request message sent by the SNPN network element is received through the first agent of the PLMN network, so that the safety and the stability of the PLMN network are improved, and the impact and the influence of a plurality of SNPN networks on the PLMN network are reduced.
S220, the first agent determines the second network element according to the first request message.
As an embodiment, the first agent may obtain the ID and/or the address of the target network element according to a local configuration, where the local configuration may include: SNPN identification, NF type, UE identification, PLMN NF ID/address and routing indicator.
Specifically, the second network element corresponds to network element type information of the second network element. For example, the second network element is a UDM network element, an AUSF network element, a PCF network element, or an SMF network element.
As another embodiment, when the local configuration does not store the corresponding relationship, the first agent may also obtain the target NF ID/address by sending a request message to the NRF. Specifically, the first agent sends a third request message to a network function repository function NRF of the first PLMN, where the third request message includes the network element type information of the second network element; and the first agent receives a second response message sent by the NRF, wherein the response message comprises the ID of the second network element and/or the address of the second network element. Optionally, the response message of the NRF reply may include IDs and/or addresses of one or more candidate network elements, and specifically, the first agent may select one of the at least one candidate network element as the second network element. The first agent may select a target network element that best meets the requirement from the plurality of candidate network elements according to the SNPN identifier in the SNPN request message or the identifier of the UE. Further, the first agent may store related association information according to a response message returned by the NRF, and specifically, the first agent may store a correspondence between a type of the second network element, an ID or an address of the second network element, and an identifier of the SNPN and an identifier of the first terminal device. The corresponding relationship may include corresponding relationship of SNPN identifier, NF type, UE identifier, PLMN NF ID/address, and routing indicator.
By storing the relevant associated information in the response message, the first agent can quickly make adaptation and select the second network element when receiving the subsequent SNPN request message.
S230, the first agent sends a second request message to the second network element.
As an embodiment, the second request message is used to request the second network element to provide a service for the first terminal device, and the second request message includes an identifier of the first terminal device.
Optionally, the second request message may be generated based on the first request message, or the second request message is the same as the first request message, and at this time, the first agent is equivalent to transparently transmitting the first request message and sends the first request message to the target network element.
Optionally, before the first agent sends the second request message to the second network element, the address of the first agent may be used as the first source address of the second request message; and taking the address of the second network element as the first target address of the second request message.
By converting the address of the SNPN network element into the address of the first agent, the address information of the SNPN network element can be ensured not to be known by a public network, and the safety of the SNPN network is protected.
S240, the first agent receives the first response message sent by the second network element.
The first response message may include a result of the processing by the second network element, for example, a processing request in the first request message: when the request message is the AMF to obtain subscription to the UDM of the PLMN, the response message may include a subscription result fed back by the UDM, such as mobile and Access (AM) subscription information of the UE; when the request message is the SMF and gets the subscription to the UDM, the response message may include SM subscription information; when the request message is an AMF to obtain an authentication result from the AUSF of the PLMN, the response message may include the authentication result, such as: when the authentication result is successful, the AUSF replies the AMF with the authentication success and carries a safety related key; when the request message is that the V-PCF acquires policy information from the H-PCF of the PLMN, the response message may include a policy rule related to the UE; when the request message requests session resources for the H-SMF of the PLMN for interactive configuration, the response message may include session-related path information, QoS information, and routing information.
S250, the first agent forwards the first response message to the first network element.
As an embodiment, before the first agent sends the first response message to the first network element, the first agent may use the address of the first agent as the second source address of the first response message; and taking the address of the first network element as a second target address of the first response message.
By replacing the address of the PLMN target NF with the address of the first agent, the address information of the PLMN network element can be ensured not to be known by the SNPN network, and the safety of the PLMN network is protected.
Fig. 3 is a schematic diagram illustrating another communication method according to an embodiment of the present application. As shown in fig. 3, the method 300 includes steps S310 and S320, which are described in detail below.
S310, the first agent in the first public land mobile network PLMN receives the fourth request message sent by the first network element of the independent non-public network SNPN.
As an embodiment, the fourth request message is used to request the first PLMN to process a first terminal device of the SNPN, and the fourth request message includes an identifier of the first terminal device, network element type information of a second network element in the first PLMN, which processes the fourth request message, and an identifier of the SNPN.
S320, the first agent rejects the fourth request message of the SNPN according to the network element type information of the second network element.
As an embodiment, the network element type information of the second network element is a network function repository function NRF.
And when the second network element type information is NRF, the SNPN request message is rejected, so that the address information of the PLMN network element can be ensured not to be known by the SNPN network, and the safety of the PLMN network is protected.
Fig. 4 shows a schematic diagram of another communication method according to the embodiment of the present application, and as shown in fig. 4, the method 400 includes steps S410 and S420, which are described in detail below.
S410, a first network element of the independent non-public network SNPN sends a first request message to a first agent of a first public land network PLMN.
As an embodiment, the first request message is used to request a first terminal device of the first PLMN to process the SNPN, and the first request message includes an identifier of the first terminal device, network element type information of a second network element of the first PLMN, which processes the first request message, and an identifier of the SNPN.
By sending the SNPN request message to the first agent, the security and the stability of the PLMN network are improved, and the impact and the influence of a plurality of SNPN networks on the PLMN network are reduced.
As an embodiment, the first network element may determine, according to an identifier of the first terminal device, an ID of the first PLMN, and obtain, according to the ID of the first PLMN, an address of the first agent; the first request message is then sent to the first agent based on the address of the first agent.
As an embodiment, when the first network element is an AMF or an SMF, the first request message may be used to request to acquire a subscription from a UDM of the first PLMN network. The AMF may obtain the ID of the target PLMN according to the identifier of the first terminal device in a local configuration manner, and then determine the address of the first agent according to the PLMN ID and the local configuration, it should be understood that the local configuration may be a correspondence between the PLMN ID and the NPN proxy and the address thereof.
As another embodiment, when the first network element is an AMF or an SMF, in order to acquire the address of the first agent, the first network element may acquire the address of the first agent by sending a request message to the NRF. Specifically, the first network element sends a second request message to a network function repository function NRF of the SNPN, where the second request message is used to request to acquire an address of the first agent, and the second request message includes the PLMN ID; and the first network element receives a second response message sent by the NRF, wherein the second response message comprises the address of the first agent.
Optionally, the second response message may further include indication information for informing the first network element to send the request message through the first agent. Specifically, the second response message may further include first proxy indication information, where the first proxy indication information is used to instruct the first network element to send the first request message to the first proxy.
As an embodiment, when the first network element is a V-SMF or a V-PCF, the first request message may be used to request an H-SMF interworking configuration session resource with the first PLMN network, or may be a policy for the V-PCF and the H-PCF interworking acquisition of the UE. The first network element may obtain an address of the first agent from the AMF, and specifically, the first network element may receive a third request message sent by the AMF, where the third request message includes the address of the first agent.
As another embodiment, when the first network element is a V-SMF or a V-PCF, the first network element may obtain the identifier of the terminal device from the AMF, and obtain the address of the first agent according to the identifier of the terminal device. Specifically, a first network element receives a fourth request message sent by an AMF, where the fourth request message is used for the first network element to obtain an address of the first agent, and the fourth request message includes an identifier of the first terminal device; the first network element determines, according to the identifier of the first terminal device, the ID of the first PLMN, and obtains, according to the ID of the first PLMN, the address of the first agent, and optionally, the first network element may obtain, according to the ID of the first PLMN and a local configuration, the address of the first agent, where the local configuration includes a correspondence between the ID of the first PLMN and the address of the first agent. Optionally, the local configuration may include a correspondence of a plurality of PLMN IDs and a plurality of proxy addresses.
Optionally, the response message may further include indication information indicating that the first network element sends the first request message to the first agent.
As an embodiment, the first network element may be a second proxy, and optionally, the second proxy may be a PLMN proxy belonging to an SNPN network, where the second proxy needs to acquire an address of the first proxy before sending the request message, and specifically, the first network element receives a fifth request message sent by an AMF, an SMF, or a V-PCF, where the fifth request message is used for the first network element to acquire the address of the first proxy, and the fifth request message includes an identifier of the first terminal device; the first network element determines, according to the identifier of the first terminal device, the ID of the first PLMN, and obtains, according to the ID of the first PLMN, the address of the first agent, and optionally, the first network element may obtain, according to the ID of the first PLMN and a local configuration, the address of the first agent, where the local configuration includes a correspondence between the ID of the first PLMN and the address of the first agent. Optionally, the local configuration may include a correspondence of a plurality of PLMN IDs and a plurality of proxy addresses.
It should be understood that, in the request information for requesting the PLMN network to process the terminal device in the embodiment of the present application, the included information may be the same, for example, in various cases described in the method 400, and redundant description is not repeated in the following embodiments.
Fig. 5 is a schematic diagram illustrating another communication method according to an embodiment of the present application. As shown in fig. 5, the method 500 includes steps S510 and S520, which are described in detail below.
S510, a third network element of the independent non-public network SNPN sends a first request message to a second agent of the SNPN.
As an embodiment, the first request message is used to request a first terminal device of a first PLMN to process the SNPN, and the first request message may include an identifier of the first terminal device, network element type information of a second network element of the first PLMN, which processes the first request message, and an identifier of the SNPN.
Alternatively, the second agent in the embodiment of the present application may be a PLMN proxy agent set in the SNPN network.
It should be understood that the request for requesting the PLMN network to process the first terminal device included in the first request message may be the same as the first request message in the above application embodiment, and redundant description is not repeated here.
As an embodiment, the third network element may obtain an address of the second agent according to a local configuration; the third network element sends the first request message to a second agent according to the address of the second agent. Alternatively, the local configuration may be the address of the home PLMN proxy.
As an embodiment, the third network element may be an AMF or an SMF, and the AMF or the SMF may obtain an address of the second agent through an NRF, and specifically, the second network element sends a second request message to a network function repository function NRF of the SNPN, where the second request message is used to request to obtain the address of the second agent; and the third network element receives a second response message sent by the NRF, wherein the second response message comprises the address of the second agent.
Optionally, the second response message may further include first proxy indication information, where the first proxy indication information is used to instruct the third network element to send the first request message to the second agent.
As another example, the third network element may be a V-SMF or a V-PCF, which may obtain the address of the second agent via the AMF. Specifically, before the third network element sends the first request message to the second agent, the method further includes: receiving a third request message sent by the AMF, wherein the third request message comprises the address of the second agent.
S520, the third network element receives a third response message sent by the second agent, where the third response message includes a result of the first PLMN processing the first terminal device.
For convenience of description, different messages in different embodiments use the same name, such as the first request message, and it should be understood that the name should correspond to the scenario of the embodiment, and may be the same or different, for example, the first request message appearing in the embodiments in fig. 2 and fig. 4 may be the same, but the first request message appearing in the embodiments in fig. 2 and fig. 5 is different, and the meaning represented by the same name is to be understood in conjunction with the specific embodiments.
Fig. 6 and fig. 7 show schematic diagrams of two network interworking architectures according to an embodiment of the present application. Fig. 6 is an interworking architecture diagram of SNPN and PLMN in a Local Breakout (LBO) roaming scenario, and fig. 7 is an interworking architecture diagram of SNPN and PLMN in a Home Routing (HR) roaming scenario.
It should be understood that the present solution may also be applied if the external subscription of the UE is provided by an authentication, authorization, and accounting Server (AAA Server) of the enterprise.
It should be understood that the NPN Proxy and the PLMN Proxy in the embodiment of the present application may be network elements that are set separately, or may be set in combination with network elements such as a Security Edge Protection Proxy (SEPP)/Service Communication Proxy (SCP)/network open function (NEF).
Optionally, on the premise that an NPN proxy is set in the PLMN network, in the above three cases, the PLMN proxy may also be set in the SNPN network. The PLMN Proxy and NPN Proxy functions are the same as those described above, but the NPN Proxy can be combined with AAA Server.
Fig. 8 is a flow chart illustrating interaction between SNPN and PLMN networks according to an embodiment of the present invention. As shown in fig. 8, the SNPN network and the PLMN network are included in the diagram, before the UE accesses the SNPN network, the PLMN network needs to be requested to process the UE that wants to access the SNPN, for example, to obtain a subscription of the UE from a network element in the PLMN, an authentication result, a policy acquisition or a PDU session processing request, etc.
S810, the network element/NF of the SNPN obtains an identifier of the UE, specifically, the AMF obtains the identifier of the UE in a registration process or a session establishment process, such as a user permanent identifier (SUPI)/a user encrypted identifier (sui), and the AMF may determine the ID of the target PLMN according to the identifier of the UE. Optionally, in this process, the cell information broadcast by the base station of the SNPN network may carry the indication of whether to support interaction with the PLMN and the supported PLMN ID, and the UE may select whether to access the SNPN network according to the indication information.
S820, AMF determines that interaction with NF of PLMN is needed, requests target PLMN to process UE, determines ID of target PLMN network according to ID of UE and then determines address of NPN proxy. Specifically, the AMF may determine, when receiving a registration message or a session establishment request message sent by the UE, whether the UE needs to interact with an NF of the PLMN network, for example: in the registration process, the AMF and the PLMN AUSF interactively authenticate the UE, and the AMF acquires a subscription from the PLMN UDM; in the session process, the SMF acquires a subscription from the PLMN UDM, and the V-SMF and the H-SMF interactively configure session resources; and in the UE policy association process, the V-PCF and the H-PCF interact and the like. After AMF judges that UE needs to interact, AMF determines ID of target PLMN according to ID of UE, such as SUPI/SUCI, etc., and then determines corresponding NPN proxy and address thereof according to the PLMN ID. Optionally, the AMF/SMF may store a correspondence between a PLMN ID supported by the SNPN network and its corresponding NPN proxy and its address in a local configuration manner.
S830, the AMF/SMF sends the SNPN request information to the NPN proxy. This step can be divided into two different cases, S830a and S830 b. Specifically, S830a, the AMF/SMF confirms that SNPN needs to interact with the PLMN NF to request the PLMN NF to process the UE, and at this time, the AMF/SMF sends an SNPN request message to the NPN proxy, where the SNPN request message may include: an identity of the UE (e.g., SUPI/sui), a target network element type NF type, an identity of the SNPN (PLMN ID + NID), a PLMN ID, and the like, and optionally, a routing indicator (routing indicator) and the like may also be included. Or S830b, AMF confirms that V-SMF/V-PCF in SNPN needs to interact with PLMN NF to request PLMN network to process UE, at this time, AMF/SMF forwards the interaction request message to V-SMF/V-PCF, and then V-SMF/V-PCF sends the request message to NPN proxy. Optionally, when the V-SMF/V-PCF does not configure the PLMN ID and the address of its corresponding NPN proxy, the request message forwarded by the AMF/SMF may include the NPN proxy address, or when the V-SMF/V-PCF configures the PLMN ID and the address of its corresponding NPN proxy, the request message may include a proxy communication indication message for instructing the V-SMF/V-PCF to send an SNPN request message through the proxy, and the V-SMF/V-PCF determines the NPN proxy address according to the UE identity and the locally configured NPN proxy information.
S840b, NPN proxy determines target NF. The NPN proxy may store the correlation information of the UE identifier, the SNPN identifier, the target PLMN ID, the PLMN NF ID/address, the NF type, and the like, and when the NPN proxy stores the correlation information in the SNPN request message, the NPN proxy may select the target NF for the SNPN request message and forward the request message to the target NF, or the NPN proxy may also generate a new request message based on the SNPN request message, and the regenerated request message includes the identifier of the terminal device. It should be understood that the NPN proxy may store the PLMN NF ID and its corresponding address in a local configuration manner, and the NPN proxy may confirm the ID of the target NF through the request message and then find its corresponding address. However, if the NPN proxy does not store the relevant related information, steps S850, S860, and S870 need to be performed.
S840b, NPN proxy determines target NF. The NPN proxy may store the UE identifier, the SNPN identifier, the target PLMN ID, the PLMN NF ID/address, and the associated information of the NF type, and when the NPN proxy stores the associated information in the SNPN request message, the NPN proxy may select the target NF for the SNPN request message and forward the request message to the target NF. However, if the NPN proxy does not store the relevant related information, steps S850, S860, and S870 need to be performed.
Optionally, S850, the NPN proxy sends, to a network function repository (network function discovery function, NRF) of the PLMN, an NF discovery request message for requesting to acquire an ID or an address of the target network element, where the request message may include: the target NF type, optionally, the request message may further include: the UE identifier (e.g., SUPI/sui), SNPN identifier (PLMN ID + NID), routing indicator, etc. may also be different according to the processing request for the terminal device included in the request message, and the parameters included in the request message may also be different, for example, when the request message is the AMF/SMF that wants to acquire the subscription information of the UE, the request message may include: NF type, identity of the UE (such as SUPI/SUCI), routing indicator; when the request message is that the AMF wants to acquire the authentication result of the UE, the request message may include: NF type, the identity of the UE (such as SUPI/SUCI), routing indicator; when the request message is that the V-PCF wants to acquire the policy, the request message may include: NF type, identity of the UE (e.g., SUPI/SUCI); or when the request message is a request for the PLMN to process the PDU session, the request message may include: NF type.
S860, the NRF returns a NF discovery response message to the NPN proxy, which may include the target NF ID and/or address. It should be understood that the NPN proxy may store the PLMN NF ID and its corresponding address in a local configuration manner, and when the NF response message returns the ID of the target NF, the NPN proxy may find its corresponding address by using the ID. Optionally, the NRF may return IDs and/or addresses of multiple candidate network elements that meet the condition, and after the NPN proxy receives the response message including the multiple candidate network element information, an optimal one of the multiple candidate network elements may be selected as the target network element, for example, the optimal one may be selected according to a network element load condition, and the like. Optionally, the NRF may reply an ID and/or an address of one or more target NFs in the response message, at this time, the NPN proxy may further select the target NF in the response message based on the SNPN identifier and the like included in the request message, and select one of the NFs as the target NF.
Optionally, in S870, the NPN proxy stores, according to the feedback of the NRF, the association information (e.g., SNPN identifier, NF type, UE identifier, PLMN NF ID/address, routing indicator) about the target network element and the UE identifier in the SNPN request message and the response message, so as to facilitate quick selection and forwarding by using local storage when receiving a similar message subsequently.
And S880, the NPN proxy sends the SNPN request message to the target NF according to the selected address of the target NF. Optionally, after receiving the SNPN request message, the NPN proxy may directly forward the SNPN request message to the target NF, or the NPN proxy may also regenerate a request message to send to the target NF, where the regenerated request message is generated based on the SNPN request message and both of the regenerated request message are to request the PLMN network to process the terminal device, and the regenerated request message includes the identifier of the UE.
S890, the target NF returns a response message to the NPN proxy, where the response message may include a result of the NF of the PLMN processing the UE, such as an interaction completion message or subscription authentication information of the UE. It should be understood that the NPN proxy may carry the address of the NPN proxy as the source address when forwarding the request message to the target NF, and therefore, the target NF may return the response message to the NPN proxy according to the address. And S8100, the NPN proxy forwards the response message to the network element which sends the SNPN request message. And S8100, the NPN proxy forwards the response message to the network element which sends the SNPN request message.
It should be understood that each network element of the SNPN, such as the AMF, the SMF, etc., may carry its own source address when sending the interaction request message, but the SNPN network may not want to expose each source address of the network element to the PLMN network, at this time, the NPN proxy may also have a function of address translation, specifically, when receiving the request message of the SNPN network element, such as the AMF1, since the SNPN request message may carry the source address 1 of the AMF1, at this time, the NPN proxy may replace the source address of the request message with the address of the NPN proxy as the source address sent to the target NF, and then replace the target address in the request message with the address of the target NF. Correspondingly, after the NPN proxy receives the response message sent by the target NF, the source address belonging to the target NF in the response message is replaced by the address of the NPN proxy to be used as the source address sent to the SNPN network element, and the target address is replaced by the address of the network element sending the request message in the SNPN. Thus, the SNPN network element address and the PLMN network element address can be secured.
Fig. 9 shows another interaction flow diagram of the embodiment of the present application. Unlike fig. 8, before the AMF/SMF sends the SNPN request message, the method of fig. 9 further includes the AMF sending a request message to NRF of the SNPN to obtain the address of the NPN proxy, that is, S920a, and the AMF sending a NF request message to NRF for requesting to obtain the address of the NPN proxy, where the request message may include: the identity of the UE and the target PLMN ID. Further, the request message may further include an NF type, an SNPN identity (PLMN ID + NID), a routing indicator, and the like. S920b, the NRF returns a NF response message to the AMF/SMF, which may include the address of the NPN proxy. Optionally, the response message may further include proxy communication indication information, which may be used to instruct the AMF/SMF to send the request message through the NPN proxy. It should be understood that, the NRF in this embodiment of the application may store the relationship between the PLMN ID and the corresponding NPN proxy and the address thereof in a local configuration manner, and the NRF may acquire the address of the NPN proxy through the target PLMN ID and the local configuration, and send the address of the NPN proxy to the AMF/SMF. The remaining steps are the same as those in fig. 8, and redundant description is not repeated in the embodiments of the present application.
Fig. 10 shows a schematic diagram of another interaction flow of the embodiment of the present application. Different from fig. 8, in the embodiment of the present application, a PLMN proxy is set in an SNPN network, and all SNPN request messages sent by the AMF/SMF are sent to the PLMN proxy, where the request messages may include an identifier of the UE, an NF type, a target PLMN ID, an SNPN identifier (PLMN ID + NID), a routing indicator, and the like. Which is then sent by the PLMN proxy to the NPN proxy. S1001 is the same as S810. S1002, the AMF/SMF determines that interaction with the PLMN NF is needed, and determines the address of the local PLMN proxy. It should be understood that the AMF/SMF may store the address of the home PLMN proxy in a local configuration manner. S1003 is similar to S830, and the AMF/SMF sends the SNPN request message, except that in S1003, the AMF/SMF sends the request message to the PLMN proxy according to the home PLMN proxy address. And S1004, optionally, the local PLMN proxy may store a corresponding relationship between the PLMN ID and the NPN proxy address in a local configuration manner, and the local PLMN proxy determines the NPN proxy address according to the UE identifier, the PLMN ID, and the local configuration, and forwards the SNPN request message according to the address. S1012, the NPN proxy forwards the SNPN response message to the PLMN proxy. S1013, the PLMN proxy forwards the response message to the AMF/SMF. The remaining steps are the same as those in fig. 8 and fig. 9, and redundant description is not repeated in this embodiment.
By setting PLMN proxy in SNPN network, SNPN configuration can be reduced, and influence of PLMN on SNPN can be shielded.
Optionally, the PLMN proxy may also have the same address translation function as the NPN proxy, so as to protect the security and stability of the SNPN network, and the specific implementation manner thereof is similar to that of the NPN proxy, and redundant description is not repeated here.
Fig. 11 shows a schematic diagram of another interaction flow of the embodiment of the present application. The embodiment of the application is a combination of the embodiments of the applications of fig. 8 and 10. The difference is that the NRF in fig. 11 stores the address of the home PLMN proxy by way of configuration. S1102b, the NRF returns the address of the AMF/SMF home PLMN proxy. The remaining specific implementation processes are the same as those in fig. 9 and fig. 10, and redundant description is not repeated in this embodiment of the application.
It should be understood that, in the embodiment of the present application, the AMF may determine the ID of the target PLMN according to the identifier of the UE, and then send the acquired target PLMN ID to another network element in a manner of a request message, and the AMF or another network element may determine the NPN proxy and its address based on the target PLMN ID determined by the identifier of the UE.
Fig. 12 shows a schematic diagram of a communication device according to an embodiment of the present application. As shown in fig. 12, the apparatus 1200 includes a first receiving module 1201, a first processing module 1202, and a first transmitting module 1203. The apparatus 1200 may be configured to implement the functions of receiving, processing, and sending messages of the first agent involved in any of the above method embodiments. The apparatus 1200 may be, for example, a first proxy or an NPN proxy network element. The network element or network function may be a network element in a hardware device, a software function running on dedicated hardware, or a virtualization function instantiated on a platform (e.g., a cloud platform).
The apparatus 1200 may be used as a first agent or an NPN proxy to process a message, and perform the step of processing the SNPN request message by the first agent in the above method embodiment. The first receiving module 1201 and the first sending module 1203 may be configured to enable the apparatus 1200 to perform communication, for example, to perform actions of sending/receiving performed by the first agent or NPN proxy in fig. 2 to 5, and the processing module 1202 may be configured to enable the apparatus 1200 to perform processing actions in the above method, for example, to perform processing actions performed by the first agent or NPN proxy in fig. 2 to 5. Optionally, the apparatus 1200 may further include a storage module for storing the SNPN identifier, the UE identifier, the PLMN ID, the NF type, the NF ID/address, and other information received by the apparatus 1200. Specifically, reference may be made to the following descriptions:
a first receiving module, configured to receive a first request message sent by a first network element of an independent non-public network SNPN, where the first request message is used to request a first PLMN to process a first terminal device of the SNPN, and the first request message includes an identifier of the first terminal device, network element type information of a second network element in the first PLMN, where the second network element processes the first request message, and an identifier of the SNPN; the first processing module is used for determining the second network element according to the first request message; a first sending module, configured to send a second request message to the second network element, where the second request message is used to request the first PLMN to process a first terminal device of the SNPN, and the second request message includes an identifier of the first terminal device; the first receiving module is further configured to receive a first response message sent by the second network element, where the first response message includes a result of the second network element processing the first terminal device; the first sending module is further configured to forward the first response message to the first network element.
Optionally, the sending module is further configured to: sending a third request message to a network function repository function NRF of the first PLMN, the third request message including network element type information of the second network element; the first receiving module is further configured to: and receiving a second response message sent by the NRF, wherein the response message comprises the ID of the second network element and/or the address of the second network element.
Optionally, the second response message includes an ID and/or an address of at least one candidate network element, and the first processing module is further configured to: selecting one of said at least one candidate network element as said second network element.
Optionally, the apparatus further comprises: a storage module, configured to store a type of the second network element, an ID or an address of the second network element, and a correspondence between the identifier of the SNPN and the identifier of the first terminal device.
Optionally, the first processing module is further configured to: taking an address of the apparatus 1200 as a first source address of the second request message; the apparatus 1200 uses the address of the second network element as the first destination address of the second request message.
Optionally, the first processing module is further configured to: the device 1200 takes the address of the device 1200 as the second source address of the first response message; the apparatus 1200 uses the address of the first network element as the second destination address of the first response message.
Fig. 13 shows a schematic diagram of another communication device of an embodiment of the present application. As shown in fig. 13, the apparatus 1300 includes a second receiving module 1301 and a second processing module 1302. The apparatus 1300 may be used to implement the functions of receiving, processing and sending messages of the first agent or NPN proxy involved in any of the above method embodiments. For example, the apparatus 1300 may be a first proxy or an NPN proxy network element. The network element or network function may be a network element in a hardware device, a software function running on dedicated hardware, or a virtualization function instantiated on a platform (e.g., a cloud platform).
The apparatus 1300 may be used as a first agent or an NPN proxy to process a message, and perform the step of processing the SNPN request message by the first agent in the above method embodiment. The second receiving module 1301 may be configured to support the apparatus 1300 to perform communication, for example, perform the receiving action performed by the first agent or NPN proxy in fig. 2 to 5, and the processing module 1302 may be configured to support the apparatus 1300 to perform the processing action in the method, for example, perform the processing action performed by the first agent or NPN proxy in fig. 2 to 11. Specifically, reference may be made to the following descriptions:
the second receiving module is configured to receive a fourth request message sent by a first network element of an independent non-public network SNPN, where the fourth request message is used to request a first PLMN to process a first terminal device of the SNPN, and the fourth request message includes an identifier of the first terminal device, network element type information of a second network element in the first PLMN, where the second network element processes the fourth request message, and an identifier of the SNPN; the second processing module is configured to reject the fourth request message of the SNPN according to the network element type information of the second network element.
Optionally, the network element type information of the second network element is a network function repository function NRF.
Fig. 14 shows a schematic diagram of another communication device of an embodiment of the present application. As shown in fig. 14, the apparatus 1400 includes a third sending module 1401 and a third receiving module 1402. The apparatus 1400 may be configured to implement the functions of receiving, processing, and sending the message of the first network element involved in any of the above method embodiments. For example, the apparatus 1400 may be a first network element or an ASM/SMF/PCF network element. The network element or network function may be a network element in a hardware device, a software function running on dedicated hardware, or a virtualization function instantiated on a platform (e.g., a cloud platform).
The apparatus 1400 may be configured to process the request message as the first network element or ASM/SMF/PCF, and perform the step of processing the SNPN request message by the first network element or ASM/SMF/PCF in the foregoing method embodiment. The third sending module 1401 and the third receiving module 1402 may be configured to support the apparatus 1400 to perform communication, for example, to perform the sending/receiving actions performed by the first network element or the AMF/SMF/PCF in fig. 2 to fig. 5. Optionally, the apparatus 1200 may further include a processing module configured to process the UE identity obtained by the apparatus 1400, and the like. Specifically, reference may be made to the following descriptions:
a third sending module, configured to send a first request message to a first agent of a first public land network PLMN, where the first request message is used to request a first terminal device of the first PLMN to process an independent non-public network SNPN, and the first request message includes an identifier of the first terminal device, network element type information of a second network element of the first PLMN, where the second network element processes the first request message, and an identifier of the SNPN; the third receiving module is configured to receive a first response message sent by the first agent, where the first response message includes a result of the first PLMN processing the first terminal device.
Optionally, the apparatus further comprises: a third processing module, configured to determine an ID of the first PLMN according to the identifier of the first terminal device, and obtain an address of the first agent according to the ID of the first PLMN; the third sending module is further configured to: sending the first request message to the first agent according to the address of the first agent.
Optionally, the apparatus 1400 is an AMF or an SMF, and the third sending module is further configured to: sending a second request message to a network function repository function NRF of the SNPN, the second request message being for requesting to obtain an address of the first agent, the second request message including the first PLMN ID; the third receiving module is further configured to: and receiving a second response message sent by the NRF, wherein the second response message comprises the address of the first agent.
Optionally, the second response message further includes first proxy indication information, where the first proxy indication information is used to instruct the apparatus 1400 to send the first request message to the first proxy.
Optionally, the apparatus 1400 is an AMF or an SMF, and the third processing module is further configured to: and determining the ID of the first PLMN according to the identifier of the first terminal equipment, and acquiring the address of the first agent according to the ID of the first PLMN.
Optionally, the apparatus 1400 is a V-SMF or a V-PCF, and the third receiving module is further configured to: and receiving a third request message sent by the AMF, wherein the third request message comprises the address of the first agent.
Optionally, the apparatus 1400 is a V-SMF or a V-PCF, and the third receiving module is further configured to: receiving a fourth request message sent by the AMF, where the fourth request message is used by the apparatus 1400 to obtain the address of the first agent, and the fourth request message includes an identifier of the first terminal device; the third processing module is used for: and determining the ID of the first PLMN according to the identifier of the first terminal equipment, and acquiring the address of the first agent according to the ID of the first PLMN.
Optionally, the fourth request message further includes second proxy indication information for instructing the apparatus 1400 to send the first request message to the first proxy.
Optionally, the apparatus 1400 is a second agent, and the third receiving module is further configured to: receiving a fifth request message sent by the AMF, the SMF, or the V-PCF, where the fifth request message is used by the apparatus 1400 to obtain the address of the first agent, and the fifth request message includes an identifier of the first terminal device; the third processing module is used for processing the data; determining the ID of the first PLMN according to the identifier of the first terminal equipment, and acquiring the address of the first agent according to the ID of the first PLMN
Optionally, the third processing module is further configured to: and acquiring the address of the first agent according to the first PLMN ID and local configuration, wherein the local configuration comprises the corresponding relation between the first PLMN ID and the address of the first agent.
Fig. 15 shows a schematic diagram of another communication device of an embodiment of the present application. As shown in fig. 15, the apparatus 1500 includes a fourth transmitting module 1501 and a fourth receiving module 1502. The apparatus 1500 may be configured to implement the functions of receiving, processing, and sending the message of the third network element involved in any of the above method embodiments. The apparatus 1500 may be, for example, a third network element or an AMF/SMF/PCF network element. The network element or network function may be a network element in a hardware device, a software function running on dedicated hardware, or a virtualization function instantiated on a platform (e.g., a cloud platform).
The apparatus 1500 may be configured to process the message as a third network element or AMF/SMF/PCF, and perform the step of processing the SNPN request message by the third network element or AMF/SMF/PCF in the foregoing method embodiment. The fourth sending module 1501 and the fourth receiving module 1502 may be configured to support the apparatus 1500 for communication, for example, to perform the sending/receiving actions performed by the third network element or AMF/SMF/PCF in fig. 2 to fig. 5. Optionally, the apparatus 1500 may further include a fourth processing module for obtaining an address of the second agent. Specifically, reference may be made to the following descriptions:
a fourth sending module, configured to send a first request message to a second proxy of the SNPN, where the first request message is used to request a first PLMN to process a first terminal device of the SNPN, and the first request message includes an identifier of the first terminal device, network element type information of a second network element in the first PLMN, where the first PLMN processes the first request message, and an identifier of the SNPN; the fourth receiving module is configured to receive a first response message sent by the second agent, where the first response message includes a result of the first PLMN processing the first terminal device.
Optionally, the apparatus further includes a fourth processing module, configured to obtain an address of the second agent according to a local configuration; the device 1500 sends the first request message to a second agent according to the address of the second agent.
Optionally, the first network element is an AMF or an SMF, and the fourth sending module is further configured to: sending a second request message to a network function repository function NRF of the SNPN, the second request message being used for requesting to acquire an address of the second agent; the fourth receiving module is further configured to: receiving a second response message sent by the NRF, wherein the second response message comprises the address of the second agent.
Optionally, the second response message further includes first proxy indication information, the first proxy indication information being used for instructing the apparatus 1500 to send the first request message to the second agent.
Optionally, the apparatus 1500 is a V-SMF or a V-PCF, and the fourth receiving module is further configured to: receiving a third request message sent by the AMF, wherein the third request message comprises the address of the second agent.
Fig. 16 is a schematic structural diagram of a communication device according to an embodiment of the present application. The communication apparatus 1600 may be used to implement the method described in the above method embodiments with respect to the first agent. The communication apparatus 1600 may be a chip or a network device.
The communication device 1600 includes one or more processors 1601, where the one or more processors 1601 are capable of supporting the communication device 1600 to implement the communication methods of fig. 2-5. Processor 1601 may be a general purpose processor or a special purpose processor. For example, the processor 1601 may be a Central Processing Unit (CPU) or a baseband processor. The baseband processor may be used to process communication data and the CPU may be used to control a communication apparatus (e.g., a network device, a terminal device, or a chip), execute a software program, and process data of the software program. The communication apparatus 1600 may further include a transceiving unit 1605 to implement input (reception) and output (transmission) of signals.
For example, the communication apparatus 1600 may be a chip, and the transceiving unit 1605 may be an input and/or output circuit of the chip, or the transceiving unit 1605 may be a communication interface of the chip, and the chip may be a component of a terminal device or a network device or other wireless communication device.
The communications device 1000 may include one or more memories 1602 having stored thereon programs 1604, the programs 1604 being executable by the processor 1601 to generate instructions 1603 such that the processor 1601 is capable of performing the methods described in the method embodiments described above in accordance with the instructions 1603. Optionally, data may also be stored in the memory 1602. Alternatively, the processor 1601 may also read data stored in the memory 1602, where the data may be stored at the same memory address as the program 1604, or at a different memory address than the program 1604.
The processor 1601 and the memory 1602 may be separately configured or integrated together, for example, on a single board or a System On Chip (SOC).
The communication device 1600 may also include a transceiving unit 1605. The transceiving unit 1605 may be referred to as a transceiver, transceiving circuit or transceiver for implementing transceiving function of the communication device through the antenna 1606.
It should be understood that the steps of the above-described method embodiments may be performed by logic circuits in the form of hardware or instructions in the form of software in the processor 1601. The processor 1601 may be a CPU, a Digital Signal Processor (DSP), an Application Specific Integrated Circuit (ASIC), a Field Programmable Gate Array (FPGA), or other programmable logic device, such as a discrete gate, a transistor logic device, or a discrete hardware component.
Fig. 17 is a schematic structural diagram of a communication device according to an embodiment of the present application. The communication apparatus 1700 may be configured to implement the method described in the above method embodiment with respect to the first network element. The communication apparatus 1700 may be a chip or a network device.
The communication device 1700 includes one or more processors 1701, and the one or more processors 1701 may enable the communication device 1700 to implement the communication methods of fig. 2 through 5. The processor 1701 may be a general purpose processor or a special purpose processor. The processor 1701 may be, for example, a Central Processing Unit (CPU) or a baseband processor. The baseband processor may be used to process communication data, and the CPU may be used to control a communication apparatus (e.g., a network device, a terminal device, or a chip), execute a software program, and process data of the software program. The communication apparatus 1700 may further include a transceiver 1705 to realize input (reception) and output (transmission) of signals.
For example, the communication apparatus 1700 may be a chip, and the transceiver 1705 may be an input and/or output circuit of the chip, or the transceiver 1705 may be a communication interface of the chip, and the chip may be a component of a terminal device or a network device or other wireless communication devices.
The communications device 1000 may include one or more memories 1702 having stored thereon programs 1704 that may be executed by the processor 1701 to generate instructions 1703 that cause the processor 1701 to perform the methods described in the method embodiments above in accordance with the instructions 1703. Optionally, data may also be stored in the memory 1702. Alternatively, the processor 1701 may read data stored in the memory 1702, the data may be stored at the same memory address as the program 1704, or the data may be stored at a different memory address from the program 1704.
The processor 1701 and the memory 1702 may be provided separately or integrated together, for example, on a single board or a System On Chip (SOC).
The communication device 1700 may further include a transceiver 1705. The transceiver 1705 may be referred to as a transceiver, a transceiver circuit, or a transceiver, and is used for performing transceiving functions of the communication device through the antenna 1706.
It should be understood that the steps of the above-described method embodiments may be performed by logic circuits in the form of hardware or instructions in the form of software in the processor 1701. The processor 1701 may be a CPU, Digital Signal Processor (DSP), Application Specific Integrated Circuit (ASIC), Field Programmable Gate Array (FPGA), or other programmable logic device, such as a discrete gate, transistor logic, or discrete hardware component.
Fig. 18 is a schematic structural diagram of a communication device according to an embodiment of the present application. The communication apparatus 1800 may be configured to implement the method described in the above method embodiment with respect to the third network element. The communication device 1800 may be a chip or a network device.
The communications apparatus 1800 includes one or more processors 1801, and the one or more processors 1801 may support the communications apparatus 1800 to implement the communications methods of fig. 2-5. The processor 1801 may be a general purpose processor or a special purpose processor. For example, the processor 1801 may be a Central Processing Unit (CPU) or a baseband processor. The baseband processor may be used to process communication data, and the CPU may be used to control a communication apparatus (e.g., a network device, a terminal device, or a chip), execute a software program, and process data of the software program. The communications device 1800 may also include a transceiving unit 1805 to enable input (reception) and output (transmission) of signals.
For example, the communication device 1800 may be a chip, and the transceiving unit 1805 may be an input and/or output circuit of the chip, or the transceiving unit 1805 may be a communication interface of the chip, and the chip may be a component of a terminal device or a network device or other wireless communication device.
One or more memories 1802 may be included in the communications apparatus 1000 and have stored thereon programs 1804, where the programs 1804 are executable by the processor 1801 to generate instructions 1803, so that the processor 1801 performs the methods described in the above-described method embodiments according to the instructions 1803. Optionally, the memory 1802 may also have data stored therein. Alternatively, the processor 1801 may also read data stored in the memory 1802, where the data may be stored at the same memory address as the program 1804, or at a different memory address from the program 1804.
The processor 1801 and the memory 1802 may be separate devices or integrated together, for example, on a single board or a System On Chip (SOC).
The communication device 1800 may also include a transceiving unit 1805. The transceiving unit 1805 may be referred to as a transceiver, transceiving circuit or transceiver, and is used for performing transceiving function of the communication device through the antenna 1806.
It should be understood that the steps of the above-described method embodiments may be performed by logic circuits in the form of hardware or instructions in the form of software in the processor 1801. The processor 1801 may be a CPU, a Digital Signal Processor (DSP), an Application Specific Integrated Circuit (ASIC), a Field Programmable Gate Array (FPGA), or other programmable logic device, such as a discrete gate, a transistor logic device, or a discrete hardware component.
An embodiment of the present application further provides a chip system, including: a processor coupled to a memory for storing a program or instructions that, when executed by the processor, cause the system-on-chip to implement the method of any of the above method embodiments.
Optionally, the number of processors in the system on chip may be one or more. The processor may be implemented by hardware or by software. When implemented in hardware, the processor may be a logic circuit, an integrated circuit, or the like. When implemented in software, the processor may be a general-purpose processor implemented by reading software code stored in a memory.
Optionally, the memory in the system-on-chip may also be one or more. The memory may be integrated with the processor or may be separate from the processor, which is not limited in this application. For example, the memory may be a non-transitory processor, such as a read only memory ROM, which may be integrated with the processor on the same chip or separately disposed on different chips, and the type of the memory and the arrangement of the memory and the processor are not particularly limited in this application.
The system-on-chip may be, for example, a Field Programmable Gate Array (FPGA), an Application Specific Integrated Circuit (ASIC), a system on chip (SoC), a Central Processing Unit (CPU), a Network Processor (NP), a digital signal processing circuit (DSP), a Microcontroller (MCU), a Programmable Logic Device (PLD), or other integrated chips.
It will be appreciated that the steps of the above described method embodiments may be performed by integrated logic circuits of hardware in a processor or instructions in the form of software. The steps of the method disclosed in connection with the embodiments of the present application may be directly implemented by a hardware processor, or may be implemented by a combination of hardware and software modules in a processor.
The embodiment of the present application further provides a computer-readable storage medium, where computer-readable instructions are stored in the computer-readable storage medium, and when the computer-readable instructions are read and executed by a computer, the computer is enabled to execute the method in any of the above method embodiments.
The embodiments of the present application further provide a computer program product, which when read and executed by a computer, causes the computer to execute the method in any of the above method embodiments.
The embodiment of the present application further provides a communication system, which includes a first network slice selection network element, a second network slice selection network element, and an access management network element. Optionally, the communication system may further include a network warehouse function network element.
It should be understood that the processor mentioned in the embodiments of the present application may be a Central Processing Unit (CPU), and may also be other general purpose processors, Digital Signal Processors (DSPs), Application Specific Integrated Circuits (ASICs), Field Programmable Gate Arrays (FPGAs) or other programmable logic devices, discrete gate or transistor logic devices, discrete hardware components, and the like. A general purpose processor may be a microprocessor or the processor may be any conventional processor or the like.
It will also be appreciated that the memory referred to in the embodiments of the application may be either volatile memory or nonvolatile memory, or may include both volatile and nonvolatile memory. The non-volatile memory may be a read-only memory (ROM), a Programmable ROM (PROM), an Erasable PROM (EPROM), an electrically Erasable EPROM (EEPROM), or a flash memory. Volatile memory can be Random Access Memory (RAM), which acts as external cache memory. By way of example, but not limitation, many forms of RAM are available, such as Static Random Access Memory (SRAM), Dynamic Random Access Memory (DRAM), Synchronous Dynamic Random Access Memory (SDRAM), double data rate SDRAM, enhanced SDRAM, SLDRAM, Synchronous Link DRAM (SLDRAM), and direct rambus RAM (DR RAM).
It should be noted that when the processor is a general-purpose processor, a DSP, an ASIC, an FPGA or other programmable logic device, a discrete gate or transistor logic device, or a discrete hardware component, the memory (memory module) is integrated in the processor.
It should be understood that, without conflict, the embodiments and/or technical features of the embodiments described in the present application may be arbitrarily combined with each other, and the technical solutions obtained after the combination also fall within the protection scope of the present application.
In the several embodiments provided in the present application, it should be understood that the disclosed apparatus and method may be implemented in other manners. For example, the above-described apparatus embodiments are merely illustrative, and for example, the division of the modules is only one logical functional division, and other divisions may be realized in practice.
The method in the embodiments of the present application, if implemented in the form of a software functional unit and sold or used as a standalone product, may be stored in a computer readable storage medium, and based on such understanding, the technical solution or parts of the technical solution in the present application may be embodied in the form of a software product stored in a storage medium, and including several instructions for causing a computer device (which may be a personal computer, a server, or a network device) to execute all or part of the steps of the method in the embodiments of the present application. The storage medium includes at least: a U-disk, a portable hard disk, a read-only memory (ROM), a Random Access Memory (RAM), a magnetic disk, an optical disk, or other various media capable of storing program codes. The above description is only for the specific embodiments of the present application, but the scope of the present application is not limited thereto, and any person skilled in the art can easily conceive of the changes or substitutions within the technical scope of the present application, and shall be covered by the scope of the present application. Therefore, the protection scope of the present application shall be subject to the protection scope of the claims.

Claims (34)

1. A method of communication, comprising:
a first agent in a first Public Land Mobile Network (PLMN) receives a first request message sent by a first network element of an independent non-public network (SNPN), wherein the first request message is used for requesting the first PLMN to provide service for first terminal equipment, and the first request message comprises an identifier of the first terminal equipment, network element type information of a second network element in the first PLMN, which is used for processing the first request message, and the identifier of the SNPN;
the first agent determines the second network element according to the first request message;
the first agent sends a second request message to the second network element, where the second request message is used to request the second network element to provide service for the first terminal device, and the second request message includes an identifier of the first terminal device;
the first agent receives a first response message sent by the second network element, wherein the first response message comprises a processing result of the second network element;
the first proxy forwards the first response message to the first network element.
2. The method of claim 1, further comprising:
the first agent sends a third request message to a network function repository function NRF of the first PLMN, the third request message including network element type information of the second network element;
and the first agent receives a second response message sent by the NRF, wherein the response message comprises the ID of the second network element and/or the address of the second network element.
3. The method according to claim 2, wherein the second response message comprises an ID and/or an address of at least one candidate network element, and
the method further comprises the following steps:
the first agent selects one of the at least one candidate network element as the second network element.
4. The method of claim 2, further comprising:
and the first agent stores the type of the second network element, the ID or address of the second network element, and the corresponding relation between the identifier of the SNPN and the identifier of the first terminal equipment.
5. The method of any of claims 1-4, wherein prior to the first agent sending a second request message to the second network element, the method further comprises:
the first agent takes the address of the first agent as the first source address of the second request message;
the first agent takes the address of the second network element as the first target address of the second request message.
6. The method of claim 5, wherein before the first agent sends the first response message to the first network element, the method further comprises:
the first agent takes the address of the first agent as a second source address of the first response message;
the first proxy takes the address of the first network element as the second target address of the first response message.
7. A method of communication, comprising:
a first agent in a first Public Land Mobile Network (PLMN) receives a fourth request message sent by a first network element of an independent non-public network (SNPN), wherein the fourth request message is used for requesting the first PLMN to process a first terminal device of the SNPN, the fourth request message comprises an identifier of the first terminal device, network element type information of a second network element in the first PLMN for processing the fourth request message and an identifier of the SNPN, and the network element type information of the second network element is a Network Repository Function (NRF);
the first agent rejects the fourth request message of the SNPN according to the network element type information of the second network element.
8. A method of communication, comprising:
a first network element of an independent non-public network (SNPN) sends a first request message to a first agent of a first public land network (PLMN), wherein the first request message is used for requesting the first PLMN to provide service for a first terminal device, and comprises an identifier of the first terminal device, network element type information of a second network element which processes the first request message in the first PLMN and the identifier of the SNPN;
and the first network element receives a first response message sent by the first agent, wherein the first response message comprises a processing result of the first PLMN.
9. The method of claim 8, further comprising:
the first network element determines the ID of the first PLMN according to the identifier of the first terminal equipment, and acquires the address of the first agent according to the ID of the first PLMN;
the first network element sends the first request message to the first agent according to the address of the first agent.
10. The method of claim 9, wherein the first network element is an AMF or an SMF, and wherein before the first network element sends the first request message to the first proxy, the method further comprises:
the first network element sends a second request message to a network function repository function NRF of the SNPN, where the second request message is used to request to acquire an address of the first agent, and the second request message includes an ID of the first PLMN;
and the first network element receives a second response message sent by the NRF, wherein the second response message comprises the address of the first agent.
11. The method of claim 10, wherein the second response message further comprises first proxy indication information, and wherein the first proxy indication information is used to instruct the first network element to send the first request message to the first proxy.
12. The method of claim 8, wherein the first network element is an AMF or an SMF, and wherein before the first network element sends the first request message to the first proxy, the method further comprises:
and the first network element determines the ID of the first PLMN according to the identifier of the first terminal equipment, and acquires the address of the first agent according to the ID of the first PLMN.
13. The method of claim 8, wherein the first network element is a V-SMF or a V-PCF, and wherein before the first network element sends the first request message to the first proxy, the method further comprises:
receiving a third request message sent by the AMF, wherein the third request message comprises the address of the first agent.
14. The method of claim 8, wherein the first network element is a V-SMF or a V-PCF, and wherein before the first network element sends the first request message to the first proxy, the method further comprises:
receiving a fourth request message sent by the AMF, where the fourth request message is used for the first network element to obtain the address of the first agent, and the fourth request message includes an identifier of the first terminal device;
and the first network element determines the ID of the first PLMN according to the identifier of the first terminal equipment, and acquires the address of the first agent according to the ID of the first PLMN.
15. The method of claim 14, wherein the fourth request message further comprises second proxy indication information, and wherein the second proxy indication information is used to indicate the first network element to send the first request message to the first agent.
16. The method of claim 8, wherein the first network element is a second agent, and wherein before the first network element sends the first request message to the first agent, the method further comprises:
the first network element receives a fifth request message sent by an AMF, an SMF or a V-PCF, wherein the fifth request message is used for the first network element to acquire the address of the first agent, and the fifth request message comprises the identifier of the first terminal equipment;
and the first network element determines the ID of the first PLMN according to the identifier of the first terminal equipment, and acquires the address of the first agent according to the ID of the first PLMN.
17. The method of any of claims 9, 12, 14 and 16, wherein the obtaining the address of the first agent based on the first PLMN ID comprises:
and acquiring the address of the first agent according to the first PLMN ID and local configuration, wherein the local configuration comprises the corresponding relation between the first PLMN ID and the address of the first agent.
18. A communications apparatus, comprising:
a first receiving module, configured to receive a first request message sent by a first network element of an independent non-public network SNPN, where the first request message is used to request a first PLMN to provide a service for a first terminal device, and the first request message includes an identifier of the first terminal device, network element type information of a second network element in the first PLMN, where the second network element processes the first request message, and an identifier of the SNPN;
a first processing module, configured to determine the second network element according to the first request message;
a first sending module, configured to send a second request message to the second network element, where the second request message is used to request the second network element to provide a service for the first terminal device, and the second request message includes an identifier of the first terminal device;
the first receiving module is further configured to receive a first response message sent by the second network element, where the first response message includes a result of the second network element processing the first terminal device;
the first sending module is further configured to forward the first response message to the first network element.
19. The apparatus of claim 18, wherein the sending module is further configured to:
sending a third request message to a network function repository function NRF of the first PLMN, the third request message including network element type information of the second network element;
the first receiving module is further configured to:
and receiving a second response message sent by the NRF, wherein the response message comprises the ID of the second network element and/or the address of the second network element.
20. The apparatus of claim 19, wherein the second response message comprises an ID and/or an address of at least one candidate network element, and wherein
The first processing module is further configured to:
selecting one of said at least one candidate network element as said second network element.
21. The apparatus of claim 19, further comprising:
a storage module, configured to store a correspondence between a type of the second network element, an ID or an address of the second network element, and the identifier of the SNPN and the identifier of the first terminal device.
22. The apparatus of any one of claims 18-21, wherein the first processing module is further configured to:
taking the address of the first agent as a first source address of the second request message;
the first agent takes the address of the second network element as the first target address of the second request message.
23. The apparatus of claim 22, wherein the first processing module is further configured to:
the first agent takes the address of the first agent as a second source address of the first response message;
the first agent takes the address of the first network element as a second destination address of the first response message.
24. A communications apparatus, comprising:
a second receiving module, configured to receive a fourth request message sent by a first network element of an independent non-public network SNPN, where the fourth request message is used to request a first terminal device of a first PLMN to process the SNPN, and the fourth request message includes an identifier of the first terminal device, network element type information of a second network element of the first PLMN, where the second network element processes the fourth request message, and the identifier of the SNPN, and the network element type information of the second network element is a network repository function NRF;
a second processing module, configured to reject the fourth request message of the SNPN according to the network element type information of the second network element.
25. A communications apparatus, comprising:
a third sending module, configured to send a first request message to a first agent of a first public land network PLMN, where the first request message is used to request the first PLMN to provide a service for a first terminal device, and the first request message includes an identifier of the first terminal device, network element type information of a second network element in the first PLMN, where the second network element processes the first request message, and an identifier of an SNPN;
a third receiving module, configured to receive a first response message sent by the first agent, where the first response message includes a processing result of the first PLMN.
26. The apparatus of claim 25, further comprising:
a third processing module, configured to determine an ID of the first PLMN according to the identifier of the first terminal device, and obtain an address of the first agent according to the ID of the first PLMN;
the third sending module is further configured to:
sending the first request message to the first agent according to the address of the first agent.
27. The apparatus of claim 25, wherein the third sending module is further configured to:
sending a second request message to a network function repository function NRF of the SNPN, the second request message being used for requesting to acquire an address of the first agent, the second request message including an ID of the first PLMN;
the third receiving module is further configured to:
and receiving a second response message sent by the NRF, wherein the second response message comprises the address of the first agent.
28. The apparatus of claim 27, wherein the second response message further comprises first proxy indication information, and wherein the first proxy indication information is used to indicate that the first network element of the SNPN sends the first request message to the first proxy.
29. The apparatus of claim 25, wherein the third processing module is further configured to: and determining the ID of the first PLMN according to the identifier of the first terminal equipment, and acquiring the address of the first agent according to the ID of the first PLMN.
30. The apparatus of claim 25, wherein the third receiving module is further configured to:
receiving a third request message sent by the AMF, wherein the third request message comprises the address of the first agent.
31. The apparatus of claim 25, wherein the third receiving module is further configured to:
receiving a fourth request message sent by the AMF, wherein the fourth request message is used for acquiring the address of the first agent, and the fourth request message comprises the identifier of the first terminal equipment;
the third processing module is used for:
and determining the ID of the first PLMN according to the identifier of the first terminal equipment, and acquiring the address of the first agent according to the ID of the first PLMN.
32. The apparatus of claim 31, wherein the fourth request message further comprises second proxy indication information, and wherein the second proxy indication information is used to instruct a first network element of the SNPN to send the first request message to the first agent.
33. The apparatus of claim 26, wherein the third receiving module is further configured to:
receiving a fifth request message sent by the AMF, the SMF or the V-PCF, wherein the fifth request message is used for acquiring the address of the first agent, and the fifth request message comprises the identifier of the first terminal equipment;
the third processing module is used for:
and determining the ID of the first PLMN according to the identifier of the first terminal equipment, and acquiring the address of the first agent according to the ID of the first PLMN.
34. The apparatus of any one of claims 26, 29, 31 and 33, wherein the third processing module is further configured to:
and acquiring the address of the first agent according to the first PLMN ID and local configuration, wherein the local configuration comprises the corresponding relation between the first PLMN ID and the address of the first agent.
CN202010281115.8A 2020-04-10 2020-04-10 Communication method and communication device Active CN113518338B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010281115.8A CN113518338B (en) 2020-04-10 2020-04-10 Communication method and communication device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010281115.8A CN113518338B (en) 2020-04-10 2020-04-10 Communication method and communication device

Publications (2)

Publication Number Publication Date
CN113518338A CN113518338A (en) 2021-10-19
CN113518338B true CN113518338B (en) 2022-09-02

Family

ID=78060090

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010281115.8A Active CN113518338B (en) 2020-04-10 2020-04-10 Communication method and communication device

Country Status (1)

Country Link
CN (1) CN113518338B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN117439819B (en) * 2023-12-20 2024-03-22 深圳市胜威南方科技有限公司 PDU cabinet safety monitoring method

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110213808A (en) * 2019-05-06 2019-09-06 腾讯科技(深圳)有限公司 Access control method, device, computer-readable medium and electronic equipment
WO2020072657A1 (en) * 2018-10-03 2020-04-09 Intel Corporation Non-public network discovery, selection, and access control in vertical domain

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2020072657A1 (en) * 2018-10-03 2020-04-09 Intel Corporation Non-public network discovery, selection, and access control in vertical domain
CN110213808A (en) * 2019-05-06 2019-09-06 腾讯科技(深圳)有限公司 Access control method, device, computer-readable medium and electronic equipment

Non-Patent Citations (4)

* Cited by examiner, † Cited by third party
Title
S2-1901764 "Introducing Non-public network";Qualcomm Incorporated等;《3GPP tsg_sa\wg2_arch》;20190219;全文 *
S2-1903581 "NPN subscription data provisioning";Samsung;《3GPP tsg_sa\wg2_arch》;20190402;全文 *
S2-2000180 "Alignments and corrections to Non-Public Network functionality";Ericsson等;《3GPP tsg_sa\wg2_arch》;20200107;全文 *
S3-191896 "Solution for Identification and Selection of Multiple NPN Subscriptions";NEC Europe Ltd;《3GPP tsg_sa\wg3_security》;20190615;全文 *

Also Published As

Publication number Publication date
CN113518338A (en) 2021-10-19

Similar Documents

Publication Publication Date Title
CN113630843B (en) Communication method and communication device
US20210076444A1 (en) Session Management Method, Apparatus, and System
US20210329583A1 (en) Apparatus and method for registration on network in wireless communication system
US20220330361A1 (en) Method for establishing connection and obtaining relay service code and communications apparatus
EP3740028B1 (en) Method for establishing pdu session and corresponding terminal device and computer-readable storage medium
US20220338106A1 (en) Slice control method and apparatus
US20220418038A1 (en) Selection of ip version
US20230029714A1 (en) Authorization method, policy control function device, and access and mobility management function device
WO2021203827A1 (en) Communication method and apparatus
CN112637785B (en) Method and apparatus for multicast transmission
US20220264527A1 (en) Communication method and apparatus, and device
CN116671183A (en) Access to a second network
KR20230008839A (en) Communication method and device
WO2020217224A1 (en) Amf and scp behavior in delegated discovery of pcf
CN114079995A (en) Relay management method and communication device
CN113473569B (en) Discovery method of application server and related device
US20220174063A1 (en) Communication method, apparatus, and system
CN113518338B (en) Communication method and communication device
CN115412911A (en) Authentication method, communication device and system
CN111770124B (en) Method and device for selecting session management network element
US20220330010A1 (en) Online Signup Method and Apparatus
US20220022023A1 (en) Method and Apparatus for Selecting Session Management Network Element
JP2019110552A (en) Network slice selection
CN115884153A (en) Communication method and device
CN113329448A (en) Communication method and device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant