CN113853006A - Method for realizing network access and related equipment - Google Patents

Method for realizing network access and related equipment Download PDF

Info

Publication number
CN113853006A
CN113853006A CN202111107207.5A CN202111107207A CN113853006A CN 113853006 A CN113853006 A CN 113853006A CN 202111107207 A CN202111107207 A CN 202111107207A CN 113853006 A CN113853006 A CN 113853006A
Authority
CN
China
Prior art keywords
user equipment
operator
network number
access
access request
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202111107207.5A
Other languages
Chinese (zh)
Inventor
毛聪杰
刘桂清
张新
李鹏
陈建刚
吕振华
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
China Telecom Corp Ltd
Original Assignee
China Telecom Corp Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by China Telecom Corp Ltd filed Critical China Telecom Corp Ltd
Priority to CN202111107207.5A priority Critical patent/CN113853006A/en
Publication of CN113853006A publication Critical patent/CN113853006A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W48/00Access restriction; Network selection; Access point selection
    • H04W48/02Access restriction performed under specific conditions
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W48/00Access restriction; Network selection; Access point selection
    • H04W48/08Access restriction or access information delivery, e.g. discovery data delivery
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W48/00Access restriction; Network selection; Access point selection
    • H04W48/16Discovering, processing access restriction or access information
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W48/00Access restriction; Network selection; Access point selection
    • H04W48/18Selecting a network or a communication service
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W76/00Connection management
    • H04W76/10Connection setup
    • H04W76/18Management of setup rejection or failure

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The disclosure provides a method and a device for realizing network access, electronic equipment and a storage medium. The method for realizing network access is executed by core network equipment and comprises the following steps: acquiring an access request of user equipment, wherein the access request comprises a wireless network number selected by the user equipment; determining a target operator corresponding to the wireless network number selected by the user equipment; and if the home operator of the user equipment is inconsistent with the target operator, rejecting the access request. The method can ensure that the user equipment is accessed to the home operator to which the user equipment belongs, can track the end-to-end signaling of the user, and avoids the problems of charging error and incapability of tracking the end-to-end signaling caused by access error.

Description

Method for realizing network access and related equipment
Technical Field
The present disclosure relates to the field of communications technologies, and in particular, to a method and an apparatus for implementing network access, an electronic device, and a storage medium.
Background
The fifth generation mobile communication (hereinafter referred to as 5G) is an important novel infrastructure, is a new kinetic energy and a new increment for leading digital economic development, can accelerate the fusion of information technologies such as artificial intelligence, Internet of things and industrial Internet with the traditional field, and plays an important role in promoting the upgrading of information industry, promoting the cross-border fusion development and enabling the transformation upgrading of the traditional industry.
In the related technology, in a core network roaming scenario, a 5G base station of an operator of a contractor broadcasts new network numbers of each operator of a sharer, in a scenario that no roaming user (i.e., a user of the operator of the sharer) belongs to a network in this area, if the roaming user starts up in this area for the first time, no home network informs which new network number corresponds to the home operator, which results in a network selection error of a terminal, and selects a new network number allocated to another operator, and in a current signaling routing mode, a user with correct network selection or wrong network selection is successfully accessed and performs a service. When the user selecting the wrong network successfully completes the initial registration and performs the service, the problems of wrong charging settlement, incapability of performing end-to-end signaling tracking on the user and the like are caused.
It is to be noted that the information disclosed in the above background section is only for enhancement of understanding of the background of the present disclosure, and thus may include information that does not constitute prior art known to those of ordinary skill in the art.
Disclosure of Invention
The method can ensure that the user equipment is accessed to a home operator to which the user equipment belongs, can track the end-to-end signaling of the user, and avoids the problems of charging errors and incapability of tracking the end-to-end signaling caused by access errors.
Additional features and advantages of the disclosure will be set forth in the detailed description which follows, or in part will be obvious from the description, or may be learned by practice of the disclosure.
The embodiment of the present disclosure provides a method for implementing network access, where the method is executed by a core network device, and includes: acquiring an access request of user equipment, wherein the access request comprises a wireless network number selected by the user equipment; determining a target operator corresponding to the wireless network number selected by the user equipment; and if the home operator of the user equipment is inconsistent with the target operator, rejecting the access request.
In an exemplary embodiment, the above method further comprises: returning a response of refusing access to the user equipment; receiving a re-access request returned by the user equipment in response to the access refusing response, wherein the re-access request comprises a wireless network number reselected by the user equipment; and determining a target operator corresponding to the radio network number reselected by the user equipment.
In an exemplary embodiment, the wireless network number selected by the user equipment is one of a first wireless network number of a first operator, a second wireless network number of a second operator and a third wireless network number of the roaming service operator, and the wireless network number reselected by the user equipment is another one of the first wireless network number, the second wireless network number and the third wireless network number.
In an exemplary embodiment, the radio network number selected by the user equipment is one of a first radio network number of a first operator and a second radio network number of a second operator, and the radio network number reselected by the user equipment is the other of the first radio network number and the second radio network number.
In an exemplary embodiment, the above method further comprises: and if the home operator of the user equipment is consistent with the target operator, sending the access request of the user equipment to core network equipment corresponding to the target operator so as to complete the access of the user equipment.
In an exemplary embodiment, if the home operator of the user equipment and the target operator are not consistent, rejecting the access request includes: and if the user identification code of the user equipment does not belong to the target operator, rejecting the access request.
In an exemplary embodiment, the core network device comprises an access and mobility management network element AMF.
An embodiment of the present disclosure provides a core network device, including: an access request obtaining module, configured to obtain an access request of a user equipment, where the access request includes a wireless network number selected by the user equipment; a target operator determining module, configured to determine a target operator corresponding to the wireless network number selected by the user equipment; an access request rejecting module, configured to reject the access request if the home operator of the user equipment is inconsistent with the target operator.
An embodiment of the present disclosure provides an electronic device, including: at least one processor; and the storage terminal device is used for storing at least one program, and when the at least one program is executed by at least one processor, the at least one processor is enabled to realize the method for realizing any network access.
The embodiment of the present disclosure provides a computer-readable storage medium, on which a computer program is stored, wherein the computer program is implemented by any one of the above-mentioned implementation methods of network access when being executed by a processor.
In the method for implementing network access provided by the embodiment of the present disclosure, the core network device of the roaming service operator may determine the target operator corresponding to the core network device according to the wireless network number selected by the user device, determine whether the target operator and the home operator of the user device are consistent, and if not, reject the access request; the method can ensure that the user equipment is accessed to the home operator to which the user equipment belongs, can track the end-to-end signaling of the user, and avoids the problems of charging error and incapability of tracking the end-to-end signaling caused by access error. In addition, the core network equipment can return an access rejection response to the user equipment, and the user equipment can reselect the wireless network number and continue to access after receiving the access rejection response, so that the success rate of correct access of the user equipment is improved.
It is to be understood that both the foregoing general description and the following detailed description are exemplary and explanatory only and are not restrictive of the disclosure.
Drawings
The accompanying drawings, which are incorporated in and constitute a part of this specification, illustrate embodiments consistent with the present disclosure and together with the description, serve to explain the principles of the disclosure. It is to be understood that the drawings in the following description are merely exemplary of the disclosure, and that other drawings may be derived from those drawings by one of ordinary skill in the art without the exercise of inventive faculty.
Fig. 1 is a flow chart illustrating a method for implementing network access according to an exemplary embodiment.
Fig. 2 is a diagram illustrating a method for guiding a user to select a correct new network number to access a network according to an example.
Figure 3 is a schematic diagram illustrating inter-operator NRF connections in a core network roaming scenario, according to an example.
Fig. 4 is a schematic diagram illustrating logical interworking of 5G networks between operators in a heterogeneous roaming scenario according to an example.
Fig. 5 is a block diagram illustrating a core network device in accordance with an example embodiment.
Fig. 6 is a schematic structural diagram of an electronic device according to an exemplary embodiment.
Detailed Description
Example embodiments will now be described more fully with reference to the accompanying drawings. Example embodiments may, however, be embodied in many different forms and should not be construed as limited to the examples set forth herein; rather, these embodiments are provided so that this disclosure will be thorough and complete, and will fully convey the concept of example embodiments to those skilled in the art. The described features, structures, or characteristics may be combined in any suitable manner in one or more embodiments.
Furthermore, the drawings are merely schematic illustrations of the present disclosure and are not necessarily drawn to scale. The same reference numerals in the drawings denote the same or similar parts, and thus their repetitive description will be omitted. Some of the block diagrams shown in the figures are functional entities and do not necessarily correspond to physically or logically separate entities. These functional entities may be implemented in the form of software, or in one or more hardware modules or integrated circuits, or in different networks and/or processor terminal devices and/or microcontroller terminal devices.
The technical scheme of the embodiment of the present disclosure can be applied to various communication systems, for example: a global system for mobile communications (GSM) system, a Code Division Multiple Access (CDMA) system, a Wideband Code Division Multiple Access (WCDMA) system, a General Packet Radio Service (GPRS), a Long Term Evolution (LTE) system, a LTE frequency division duplex (frequency division duplex, FDD) system, a LTE Time Division Duplex (TDD), a universal mobile telecommunications system (universal mobile telecommunications system, UMTS), a Worldwide Interoperability for Microwave Access (WiMAX) communication system, and a fifth generation (5G) or New Radio (NR) system.
The technical scheme of the embodiment of the disclosure can be applied to a core network roaming scene.
The core network roaming refers to that one operator (i.e. carrier operator) independently establishes a complete set of 5G network (including a wireless network and a core network), and users of other operators (i.e. sharing carrier operators) can access the network and use mobile communication services. The technical method is suitable for 2/3/4/5G network signals that a sharing party has an operator without attribution in a relevant area. In terms of service implementation, in a roaming responsibility area, an contractor operator (also called a roaming service operator) opens services such as 5G voice, data and short messages to other operator users by increasing new network numbers of other operators, and ensures communication quality. The routing mode can be the intercommunication of the home network and the 5G core network of the roaming network, the authentication registration can be carried out by returning to the home network based on the IMSI number segment, and the home network is responsible for the work of voice connection, Internet access, short message processing and the like.
Hereinafter, the steps of the method for implementing network access in the exemplary embodiment of the present disclosure will be described in more detail with reference to the drawings and the embodiment.
Fig. 1 is a flow chart illustrating a method for implementing network access according to an exemplary embodiment. The method provided by the embodiment of the present disclosure may be performed by a core network device of a roaming service operator, but the present disclosure is not limited thereto.
In the embodiment of the present disclosure, the roaming service operator may be a carrier for building a 5G network.
As shown in fig. 1, a method for implementing network access provided by the embodiment of the present disclosure may include the following steps.
In step S102, an access request of the ue is obtained, where the access request includes a radio network number selected by the ue.
In the embodiment of the present disclosure, before the ue accesses, the base station may broadcast the first wireless network number of the first operator, the second wireless network number of the second operator, and the third wireless network number or the fourth wireless network number of the roaming service operator.
The third wireless network number of the roaming service operator may be a new network number, and the fourth wireless network number of the roaming service operator may be an old network number.
That is to say, in the embodiment of the present disclosure, the base station needs to broadcast a new network number of another sharing party operator in addition to the wireless network number of the roaming service operator, and each sharing party operator corresponds to one new network number.
In the following description, the roaming service operator (or carrier operator) is the operator C, the third wireless network number is C, the fourth wireless network number is C', the first operator is the operator a, the first wireless network number is a, the second operator is the operator B, and the second wireless network number is B, which are all taken as examples, but the disclosure is not limited thereto.
For example, operator C is responsible for building a 5G base station in a core network roaming area, the operator C provides roaming service for operator a and operator B, and the 5G base station in the area broadcasts a new network number a of operator a and a new network number B of operator B; operator C may broadcast a new Network number C, or a previously assigned old Network number C', written in a Forbidden PLMN (Public Land Mobile Network) list in the SIM (Subscriber identity Module) cards of the terminals corresponding to operator a and operator B, to which the users of operators a and B do not attempt to access.
In the embodiment of the present disclosure, in a case that the base station broadcasts the first access network number, the second access network number, and the third wireless network number, the user equipment may randomly select one of the first access network number, the second access network number, and the third wireless network number for access.
In the embodiment of the present disclosure, when the base station broadcasts the first access network number, the second access network number, and the fourth wireless network number, since the fourth wireless network number is in the forbidden list of the user equipment, the user equipment does not select the fourth wireless network number, and the user equipment can randomly select one of the first access network number and the second access network number for access.
Taking the operator a as an example, the operator a has no other mobile network signals in the above area, and when the 5G user equipment of the operator a is turned on in the area for the first time, the PLMN a, b, c or c' can be searched at the same time. In case of broadcasting PLMNs a, b, c, the user may randomly select PLMN a, b or c for access; in case of broadcasting the PLMNs a, b, c', the user may randomly select the network number PLMN a or b for access.
In the embodiment of the present disclosure, after the user equipment randomly selects one wireless network number, the core network device of the operator C may obtain an access request of the user equipment, where the access request includes the wireless network number selected by the user equipment.
In an exemplary embodiment, the core network device may include an AMF (Access and Mobility Management Function, Access and Mobility Management network element).
In the following, the core network device is taken as an AMF as an example for explanation, but the present disclosure is not limited thereto.
For example, the user equipment selects the wireless network number b, and initiates an initial registration request, where the registration request carries the wireless network number b accessed by the terminal equipment.
In step S104, a target operator corresponding to the wireless network number selected by the user equipment is determined.
In this embodiment of the present disclosure, the AMF of the operator C may determine a target operator corresponding to the wireless network number selected by the user equipment.
For example, if the wireless network number selected by the user equipment is a, it may be determined that the target operator is operator a; for another example, if the number of the wireless network selected by the user equipment is B, it may be determined that the target operator is operator B.
In step S106, if the home operator and the target operator of the user equipment are not consistent, the access request is rejected.
In the embodiment of the present disclosure, the AMF of the operator C may determine whether the home operator (i.e., the actual operator) of the user equipment is consistent with the target operator (i.e., the operator selected by the user for access), and reject the access request if the home operator of the user equipment is inconsistent with the target operator; if the home operator of the user equipment is consistent with the target operator, the access request of the user equipment is sent to core network equipment corresponding to the target operator (namely, the home operator) so as to complete the access of the user equipment.
In the embodiment of the present disclosure, determining whether the home operator of the user equipment is consistent with the target operator may be performed by determining whether the user identifier of the user equipment belongs to the target operator.
If the user identification code of the user equipment does not belong to the target operator, the access request is refused; if the identification code of the user equipment belongs to the target operator, the access request of the user equipment is sent to a UDM/AUSF (Unified Data Management, Unified Data Management Web page/Authentication Server Function, Authentication service network element) of the home operator so as to complete the access of the user equipment.
The identifier of the ue may be an IMSI (International Mobile Subscriber Identity).
For example, the AMF of the operator C (which may also be referred to as a visited AMF) performs a comparison check on the network number selected by the user and the IMSI thereof, and if the IMSI thereof is found not to belong to the operator corresponding to the selected network number, the user is denied access; if the visiting AMF verifies that the IMSI belongs to the operator corresponding to the selected Network number, the user is allowed to access, NRF (Network security function) is inquired according to a normal flow, and the message is routed back to the home Network, so that initial registration is completed, and the user can normally use the service.
In the embodiment of the present disclosure, after the AMF of the operator C rejects the access request of the user equipment, an access rejection response may be returned to the user equipment.
The reject access response may carry a reject reason, and the reject may be, for example, a reason value #11(PLMN not allowed).
In the embodiment of the disclosure, after receiving the response of denying access, the user equipment may reselect another wireless network number for re-access.
In the embodiment of the present disclosure, the AMF of the operator C may receive a re-access request returned by the ue in response to the response refusing to access, where the re-access request includes a radio network number reselected by the ue; and determining a target operator corresponding to the radio network number reselected by the user equipment.
In the embodiment of the disclosure, the AMF of the operator C may re-determine whether the home operator and the target operator of the user equipment are consistent, and if the home operator and the target operator of the user equipment are not consistent, reject the access request; and if the home operator of the user equipment is consistent with the target operator, sending the access request of the user equipment to core network equipment corresponding to the target operator so as to complete the access of the user equipment.
In the embodiment of the present disclosure, in a case that the base station broadcasts the first access network number, the second access network number, and the third wireless network number, the user equipment randomly selects one from the first access network number, the second access network number, and the third wireless network number to access, and if the user equipment is denied to access, the user equipment selects one from the first access network number, the second access network number, and the third wireless network number that is different from the wireless network number selected last time to access.
For example, under the condition of broadcasting the PLMNs a, b, and C, the user equipment of the operator a randomly selects the wireless network number b for access for the first time, the AMF of the operator C determines that the home operator of the user equipment is inconsistent with the target operator corresponding to the wireless network number selected by the user equipment, and the AMF of the operator C rejects the access request of the user equipment; if the user equipment of the operator A reselects the wireless network number C for access, the AMF of the operator C judges that the home operator of the user equipment is inconsistent with the target operator corresponding to the wireless network number selected by the user equipment, and refuses the access request of the user equipment again; and if the user equipment of the operator A reselects the wireless network number a for access, and the AMF of the operator C judges that the home operator of the user equipment is consistent with the target operator corresponding to the wireless network number selected by the user equipment, the user equipment is allowed to access.
In the embodiment of the present disclosure, when the base station broadcasts the first access network number, the second access network number, and the fourth wireless network number, since the fourth wireless network number is in the forbidden list of the user equipment, the user equipment does not select the fourth wireless network number, the user equipment may randomly select one from the first access signal and the second access signal to access, and if the user is denied access, the user equipment selects a wireless network number different from the wireless network number selected last time to access.
For example, under the condition of broadcasting the PLMNs a, b, and C, the user equipment of the operator a randomly selects the wireless network number b for access for the first time, the AMF of the operator C determines that the home operator of the user equipment is inconsistent with the target operator corresponding to the wireless network number selected by the user equipment, and the AMF of the operator C rejects the access request of the user equipment; and if the user equipment of the operator A reselects the wireless network number a for access, and the AMF of the operator C judges that the home operator of the user equipment is consistent with the target operator corresponding to the wireless network number selected by the user equipment, the user equipment is allowed to access.
In the method for implementing network access provided by the embodiment of the present disclosure, the core network device of the roaming service operator may determine the target operator corresponding to the core network device according to the wireless network number selected by the user device, determine whether the target operator and the home operator of the user device are consistent, and if not, reject the access request; the method can ensure that the user equipment is accessed to the home operator to which the user equipment belongs, can track the end-to-end signaling of the user, and avoids the problems of charging error and incapability of tracking the end-to-end signaling caused by access error. In addition, the core network equipment can return an access rejection response to the user equipment, and the user equipment can reselect the wireless network number and continue to access after receiving the access rejection response, so that the success rate of correct access of the user equipment is improved.
Fig. 2 is a diagram illustrating a method for guiding a user to select a correct new network number to access a network according to an example.
Referring to fig. 2, in S1, when the user equipment UE of operator a is first powered on in the shared area, it may randomly select a radio network number (e.g., select radio network number b) for access, and send a registration request message to the AMF; in S2, when the user accesses, the AMF checks the IMSI number segment of the user and the network number selected for the user, and if the IMSI number segment does not match the network number selected for the user, the AMF denies the user access; in S3, the AMF returns a reject access response to the UE; the UE may reselect the wireless network number (e.g., select wireless network number a), the AMF checks the IMSI number segment of the user and the network number selected by the user again, and after verifying that the correspondence is satisfied, in S4, routes the signaling message of the user to the home network (UDM/AUSF of operator a) for authentication according to the number segment.
Figure 3 is a schematic diagram illustrating inter-operator NRF connections in a core network roaming scenario, according to an example.
Fig. 4 is a schematic diagram illustrating logical interworking of 5G networks between operators in a heterogeneous roaming scenario according to an example.
Referring to fig. 3, a VPLMN (Visited Public Land Mobile Network) may include a VPLMN NF (Network Function), a vNRF, and a HPLMN (Home Public Land Mobile Network) may include an hNRF, which may communicate with the hNRF through N27.
Referring to fig. 4, the roaming place may include V-NSSF (Network Slice Selection Function), V-PCF (policy Control Function), AMF, V-SMF (Session Management Function), UE, (R) AN, UPF (User Plane Function), User Plane Network element, and the home place may include AUSF, UDM, H-NSSF, H-SMF, H-PCF, AF (Application Function, Application Network element), UPF, DN (Data Network ), and the UE may communicate with (R) AN through N1, (R) AN may communicate with AMF through N2, (R) AN may communicate with UPF through N3, and UPF may communicate with V-SMF/H-SMF through N4, and between UPFs may communicate with N9, UPF may communicate with N6, and amv-SMF may communicate with SMF through N-11, smv-SMF may communicate with N-16, the H-SMF may communicate with the H-PCF via N7, the H-PCF may communicate with the AF via N5, the AMF may communicate with the V-NSSF via N22, the AMF may communicate with the AUSF via N12, the AMF may communicate with the V-PCF via N15, the AMF may communicate with the UDM via N8, the V-NSSF may communicate with the H-NNSF via N31, the AUSF may communicate with the UDM via N13, the UDM may communicate with the H-SMF via N10, and the V-PCF may communicate with the H-PCF via N24.
The following describes a method for implementing network access according to the embodiment of the present disclosure, taking a roaming service operator as an a-operator as an example.
For example, the first operator is responsible for the construction of a 5G base station in a certain area where a core network roams, and provides roaming services for the second operator and the third operator, and the 5G base station in the area may broadcast a new network number 46088 of the second operator and a new network number 46089 of the third operator; and the new network number 46090 of operator a. The third operator has no other mobile network signals in the area, when the 5G user of the third operator is first powered on in the area, the network numbers 46088, 46089 and 46090 can be searched at the same time, and without the guidance of the home network, the user will treat the three new network numbers equally (the network numbers are not written in any PLMN list in the SIM card), and randomly select one of the new network numbers for access. Assuming that the user randomly selects 46088 to access, the user equipment initiates initial registration, the message carries the accessed wireless network number 46008, the V-AMF of the first operator checks the network number 46088 selected by the user and the IMSI thereof, finds that the IMSI does not belong to the operator b corresponding to the selected network number 46088, denies the user access, and rejects a cause value #11(PLMN not allowed) carried in a response message to registration rejection, after receiving the rejection message, the user reselects another new network number 46089 to re-access, and verifies that the IMSI belongs to the operator c corresponding to the selected network number 46089, the V-AMF allows the user to access, queries NRF according to a normal flow, and routes the message back to the home network, thereby completing the initial registration, and the user can normally use the service.
The following is an embodiment of a core network device of the present disclosure, which may be used to implement an embodiment of the method of the present disclosure. For details not disclosed in the embodiments of the core network device of the present disclosure, refer to the embodiments of the method of the present disclosure.
Fig. 5 is a block diagram illustrating a core network device in accordance with an example embodiment.
As shown in fig. 5, the core network device 500 may include: an access request acquisition module 502, a target operator determination module 504, and an access request denial module 506.
The access request obtaining module 502 is configured to obtain an access request of a user equipment, where the access request includes a wireless network number selected by the user equipment; the target operator determining module 504 is configured to determine a target operator corresponding to the wireless network number selected by the user equipment; the access request rejecting module 506 is configured to reject the access request if the home operator of the ue is not consistent with the target operator.
In an exemplary embodiment, the core network device 500 may further include: an access rejection response returning module, configured to return an access rejection response to the user equipment; a re-access request receiving module, configured to receive a re-access request returned by the ue in response to the access denial response, where the re-access request includes a radio network number reselected by the ue; and the target operator re-determining module is used for determining the target operator corresponding to the wireless network number re-selected by the user equipment.
In an exemplary embodiment, the wireless network number selected by the user equipment is one of a first wireless network number of a first operator, a second wireless network number of a second operator and a third wireless network number of the roaming service operator, and the wireless network number reselected by the user equipment is another one of the first wireless network number, the second wireless network number and the third wireless network number.
In an exemplary embodiment, the radio network number selected by the user equipment is one of a first radio network number of a first operator and a second radio network number of a second operator, and the radio network number reselected by the user equipment is the other of the first radio network number and the second radio network number.
In an exemplary embodiment, the core network device 500 may further include: and the access module is used for sending the access request of the user equipment to the core network equipment corresponding to the target operator to complete the access of the user equipment if the home operator of the user equipment is consistent with the target operator.
In an exemplary embodiment, the access request denial module 506: an access request rejecting unit, configured to reject the access request if the user identifier of the user equipment does not belong to the target operator.
In an exemplary embodiment, the core network device comprises an access and mobility management network element AMF.
It is noted that the block diagrams shown in the above figures are functional entities and do not necessarily correspond to physically or logically separate entities. These functional entities may be implemented in the form of software, or in one or more hardware modules or integrated circuits, or in different networks and/or processor devices and/or microcontroller devices.
Fig. 6 is a schematic structural diagram of an electronic device according to an exemplary embodiment. It should be noted that the electronic device shown in fig. 6 is only an example, and should not bring any limitation to the functions and the scope of use of the embodiments of the present disclosure.
As shown in fig. 6, the electronic apparatus 600 includes a Central Processing Unit (CPU)601 that can perform various appropriate actions and processes in accordance with a program stored in a Read Only Memory (ROM)602 or a program loaded from a storage section 608 into a Random Access Memory (RAM) 603. In the RAM 603, various programs and data necessary for the operation of the system 600 are also stored. The CPU 601, ROM 602, and RAM 603 are connected to each other via a bus 604. An input/output (I/O) interface 605 is also connected to bus 604.
The following components are connected to the I/O interface 605: an input portion 606 including a keyboard, a mouse, and the like; an output portion 607 including a display such as a Cathode Ray Tube (CRT), a Liquid Crystal Display (LCD), and the like, and a speaker; a storage section 608 including a hard disk and the like; and a communication section 609 including a network interface card such as a LAN card, a modem, or the like. The communication section 609 performs communication processing via a network such as the internet. The driver 610 is also connected to the I/O interface 605 as needed. A removable medium 611 such as a magnetic disk, an optical disk, a magneto-optical disk, a semiconductor memory, or the like is mounted on the drive 610 as necessary, so that a computer program read out therefrom is mounted in the storage section 608 as necessary.
In particular, according to an embodiment of the present disclosure, the processes described above with reference to the flowcharts may be implemented as computer software programs. For example, embodiments of the present disclosure include a computer program product comprising a computer program embodied on a computer readable medium, the computer program comprising program code for performing the method illustrated in the flow chart. In such an embodiment, the computer program may be downloaded and installed from a network through the communication section 609, and/or installed from the removable medium 611. The above-described functions defined in the system of the present disclosure are executed when the computer program is executed by a Central Processing Unit (CPU) 601.
It should be noted that the computer readable media shown in the present disclosure may be computer readable signal media or computer readable storage media or any combination of the two. A computer readable storage medium may be, for example, but not limited to, an electronic, magnetic, optical, electromagnetic, infrared, or semiconductor system, terminal device, or apparatus, or any combination of the foregoing. More specific examples of the computer readable storage medium may include, but are not limited to: an electrical connection having one or more wires, a portable computer diskette, a hard disk, a Random Access Memory (RAM), a read-only memory (ROM), an erasable programmable read-only memory (EPROM or flash memory), an optical fiber, a portable compact disc read-only memory (CD-ROM), an optical storage device, a magnetic storage device, or any suitable combination of the foregoing. In the present disclosure, a computer readable storage medium may be any tangible medium that can contain, or store a program for use by or in connection with an instruction execution system, terminal device, or apparatus. In contrast, in the present disclosure, a computer-readable signal medium may include a propagated data signal with computer-readable program code embodied therein, for example, in baseband or as part of a carrier wave. Such a propagated data signal may take many forms, including, but not limited to, electro-magnetic, optical, or any suitable combination thereof. A computer readable signal medium may also be any computer readable medium that is not a computer readable storage medium and that can communicate, propagate, or transport a program for use by or in connection with an instruction execution system, terminal device, or apparatus. Program code embodied on a computer readable medium may be transmitted using any appropriate medium, including but not limited to: wireless, wire, fiber optic cable, RF, etc., or any suitable combination of the foregoing.
The flowchart and block diagrams in the figures illustrate the architecture, functionality, and operation of possible implementations of systems, methods and computer program products according to various embodiments of the present disclosure. In this regard, each block in the flowchart or block diagrams may represent a module, segment, or portion of code, which comprises one or more executable instructions for implementing the specified logical function(s). It should also be noted that, in some alternative implementations, the functions noted in the block may occur out of the order noted in the figures. For example, two blocks shown in succession may, in fact, be executed substantially concurrently, or the blocks may sometimes be executed in the reverse order, depending upon the functionality involved. It will also be noted that each block of the block diagrams or flowchart illustration, and combinations of blocks in the block diagrams or flowchart illustration, can be implemented by special purpose hardware-based systems which perform the specified functions or acts, or combinations of special purpose hardware and computer instructions.
The units described in the embodiments of the present disclosure may be implemented by software or hardware. The described units may also be provided in a processor, and may be described as: a processor includes a transmitting unit, an obtaining unit, a determining unit, and a first processing unit. The names of these units do not in some cases constitute a limitation to the unit itself, and for example, the sending unit may also be described as a "unit sending a picture acquisition request to a connected server".
As another aspect, the present disclosure also provides a computer-readable medium, which may be contained in the apparatus described in the above embodiments; or may be separate and not incorporated into the device. The computer readable medium carries one or more programs which, when executed by a device, cause the device to comprise: acquiring an access request of user equipment, wherein the access request comprises a wireless network number selected by the user equipment; determining a target operator corresponding to the wireless network number selected by the user equipment; and if the home operator of the user equipment is inconsistent with the target operator, rejecting the access request.
Exemplary embodiments of the present disclosure are specifically illustrated and described above. It is to be understood that the disclosure is not limited to the precise arrangements, instrumentalities, or instrumentalities described herein; on the contrary, the disclosure is intended to cover various modifications and equivalent arrangements included within the spirit and scope of the appended claims.

Claims (10)

1. A method for implementing network access, the method being performed by a core network device of a roaming service operator, the method comprising:
acquiring an access request of user equipment, wherein the access request comprises a wireless network number selected by the user equipment;
determining a target operator corresponding to the wireless network number selected by the user equipment;
and if the home operator of the user equipment is inconsistent with the target operator, rejecting the access request.
2. The method of claim 1, further comprising:
returning a response of refusing access to the user equipment;
receiving a re-access request returned by the user equipment in response to the access refusing response, wherein the re-access request comprises a wireless network number reselected by the user equipment;
and determining a target operator corresponding to the radio network number reselected by the user equipment.
3. The method of claim 2, wherein the radio network number selected by the UE is one of a first radio network number of a first operator, a second radio network number of a second operator, and a third radio network number of the roaming service operator, and wherein the radio network number reselected by the UE is another one of the first radio network number, the second radio network number, and the third radio network number.
4. The method of claim 2, wherein the radio network number selected by the UE is one of a first radio network number of a first operator and a second radio network number of a second operator, and wherein the radio network number reselected by the UE is the other of the first radio network number and the second radio network number.
5. The method of claim 1, further comprising:
and if the home operator of the user equipment is consistent with the target operator, sending the access request of the user equipment to core network equipment corresponding to the target operator so as to complete the access of the user equipment.
6. The method of claim 1, wherein rejecting the access request if the home operator of the user equipment and the target operator are not the same comprises:
and if the user identification code of the user equipment does not belong to the target operator, rejecting the access request.
7. The method according to any of claims 1-6, wherein said core network equipment comprises an access and mobility management element, AMF.
8. An apparatus for implementing network access, comprising:
an access request obtaining module, configured to obtain an access request of a user equipment, where the access request includes a wireless network number selected by the user equipment;
a target operator determining module, configured to determine a target operator corresponding to the wireless network number selected by the user equipment;
an access request rejecting module, configured to reject the access request if the home operator of the user equipment is inconsistent with the target operator.
9. An electronic device, comprising:
at least one processor;
storage means for storing at least one program which, when executed by the at least one processor, causes the at least one processor to carry out the method of any one of claims 1 to 7.
10. A computer-readable storage medium, on which a computer program is stored, which, when being executed by a processor, carries out the method according to any one of claims 1 to 7.
CN202111107207.5A 2021-09-22 2021-09-22 Method for realizing network access and related equipment Pending CN113853006A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202111107207.5A CN113853006A (en) 2021-09-22 2021-09-22 Method for realizing network access and related equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202111107207.5A CN113853006A (en) 2021-09-22 2021-09-22 Method for realizing network access and related equipment

Publications (1)

Publication Number Publication Date
CN113853006A true CN113853006A (en) 2021-12-28

Family

ID=78974858

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202111107207.5A Pending CN113853006A (en) 2021-09-22 2021-09-22 Method for realizing network access and related equipment

Country Status (1)

Country Link
CN (1) CN113853006A (en)

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2016173347A1 (en) * 2015-04-30 2016-11-03 广东欧珀移动通信有限公司 Network access method and mobile communications terminal
CN109275162A (en) * 2012-12-11 2019-01-25 华为技术有限公司 Connection control method, base station, user equipment and mobile management entity
CN111683360A (en) * 2020-06-02 2020-09-18 北京字节跳动网络技术有限公司 Mobile communication method, device and electronic equipment
CN111698763A (en) * 2019-11-20 2020-09-22 中国电信股份有限公司 Terminal residing network control method, MME (mobility management entity) equipment, AMF (advanced metering framework) equipment and network
CN112312378A (en) * 2019-07-29 2021-02-02 中国移动通信集团山东有限公司 Sharing method and device of operator network and core network equipment

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109275162A (en) * 2012-12-11 2019-01-25 华为技术有限公司 Connection control method, base station, user equipment and mobile management entity
WO2016173347A1 (en) * 2015-04-30 2016-11-03 广东欧珀移动通信有限公司 Network access method and mobile communications terminal
CN112312378A (en) * 2019-07-29 2021-02-02 中国移动通信集团山东有限公司 Sharing method and device of operator network and core network equipment
CN111698763A (en) * 2019-11-20 2020-09-22 中国电信股份有限公司 Terminal residing network control method, MME (mobility management entity) equipment, AMF (advanced metering framework) equipment and network
CN111683360A (en) * 2020-06-02 2020-09-18 北京字节跳动网络技术有限公司 Mobile communication method, device and electronic equipment

Similar Documents

Publication Publication Date Title
CN109219111B (en) Slice selection method and device
US7920846B2 (en) Method for implementing access restriction of mobile networks
WO2020259306A1 (en) Network search configuration method, registration method, apparatus, and system
US20140256315A1 (en) Method of Improving the Management of Mobility in a Cellular Mobile Communications System
US20040203775A1 (en) Method for allowing access to services in a cellular mobile radiocommunication system
EP2276279A1 (en) User device validation method, device identification register and access control system
WO2020040752A1 (en) Support for enterprise network slicing and flexible sub-slicing controlled by an enterprise
CN113498121A (en) Communication method and device
US20230107525A1 (en) Method and system for improving plmn selection based on required services/slices for roaming subscribers
US20230127814A1 (en) Method and apparatus for manually selecting a network
CN115915093A (en) EPLMN list setting method, core network equipment and medium
CN113727325B (en) Session processing method and related equipment
CN108966300B (en) Network switching method, device and system for dual-mode module
CN106664558B (en) Method and device for establishing a connection
US10959097B1 (en) Method and system for accessing private network services
US20230284121A1 (en) Method, device and computer program product for wireless communication
CN114900833B (en) Authentication method and device, storage medium and electronic equipment
CN113853006A (en) Method for realizing network access and related equipment
EP2461632A2 (en) Method and system for registration of owner's terminal in small network of base stations
CN114071465A (en) Access control method, device and communication equipment
CN114079923B (en) Information configuration method and device and communication equipment
WO2024120353A1 (en) Communication method, and terminal and core network function
CN114629793B (en) Method and device for determining core network element, electronic equipment and storage medium
KR20100035050A (en) System and method for preferred roaming service through network based location registering control
CN113825209A (en) Access method, device and equipment of shared network

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination