CN114599112A - Random access method, device and system - Google Patents

Random access method, device and system Download PDF

Info

Publication number
CN114599112A
CN114599112A CN202011404557.3A CN202011404557A CN114599112A CN 114599112 A CN114599112 A CN 114599112A CN 202011404557 A CN202011404557 A CN 202011404557A CN 114599112 A CN114599112 A CN 114599112A
Authority
CN
China
Prior art keywords
identifier
access
random access
temporary mobile
node
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202011404557.3A
Other languages
Chinese (zh)
Inventor
银宇
戚彩霞
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Huawei Technologies Co Ltd
Original Assignee
Huawei Technologies Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Huawei Technologies Co Ltd filed Critical Huawei Technologies Co Ltd
Priority to CN202011404557.3A priority Critical patent/CN114599112A/en
Priority to PCT/CN2021/130862 priority patent/WO2022116809A1/en
Publication of CN114599112A publication Critical patent/CN114599112A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W74/00Wireless channel access, e.g. scheduled or random access
    • H04W74/08Non-scheduled or contention based access, e.g. random access, ALOHA, CSMA [Carrier Sense Multiple Access]
    • H04W74/0833Non-scheduled or contention based access, e.g. random access, ALOHA, CSMA [Carrier Sense Multiple Access] using a random access procedure
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W74/00Wireless channel access, e.g. scheduled or random access
    • H04W74/08Non-scheduled or contention based access, e.g. random access, ALOHA, CSMA [Carrier Sense Multiple Access]

Abstract

The application provides a method, a device and a system for random access, wherein the method comprises the following steps: the terminal equipment generates a random access identifier, and the random access identifier is used for identifying the terminal equipment in the random access process; the terminal equipment sends a first request message to an access node, wherein the first request message comprises the random access identifier and is used for requesting to access a wireless network; the terminal equipment receives a first response message from the access node, wherein the first response message comprises the random access identification, the length of the random access identification is less than that of a temporary mobile user identification, and the length of the temporary mobile user identification is greater than or equal to 64 bits. After the length of the temporary mobile user identifier is extended, the terminal equipment generates a random access identifier meeting the length requirement, so that the terminal equipment can still normally access a wireless network in the random access process, and the random access success rate is ensured.

Description

Random access method, device and system
Technical Field
The present application relates to the field of communications, and more particularly, to a method, apparatus, and system for random access.
Background
In the random access process, the terminal equipment sends an initial uplink transmission message to the access node, and if the terminal equipment is allowed to be accessed, the access node sends a competition resolving message to the terminal equipment. The initial uplink transmission message and the contention resolution message may both carry a wireless access user identifier, and the wireless access user identifier may be used to identify the terminal device in a random access process. The terminal equipment acquires whether the terminal equipment is successfully accessed by judging whether the wireless access user identification carried in the competition resolving message is consistent with the wireless access user identification carried in the initial uplink transmission message.
Currently, the radio access subscriber identity includes a temporary mobile subscriber identity, and the temporary mobile subscriber identity is a partial field in a globally unique temporary mobile subscriber identity. The temporary mobile subscriber identity is used to identify or look up a context of the terminal device stored on the network device. In addition, a randomized field is left in the temporary mobile subscriber identity so that the globally unique temporary subscriber identity of the terminal device can be changed frequently.
With the continuous development of mobile communication technology, the current management mechanism for allocating the global unique temporary user identifier cannot meet the increasing user requirements. And in order to support more users, the globally unique temporary user identity may be extended by extending the temporary mobile user identity. However, the expansion of the temporary mobile subscriber identity causes a change in the wireless access subscriber identity, which may further cause access failure of the terminal device in the random access process, and reduce the success rate of random access.
Disclosure of Invention
The application provides a random access method, a device and a system, which can still realize the successful access of terminal equipment in the random access process under the condition of expanding the length of a temporary mobile user identifier, thereby ensuring the success rate of the random access.
In a first aspect, a method for random access is provided, where the method includes: the terminal equipment generates a random access identifier, and the random access identifier is used for identifying the terminal equipment in the random access process; the terminal equipment sends a first request message to an access node, wherein the first request message comprises the random access identifier, and the first request message is used for requesting to access a wireless network in the random access process; the terminal equipment receives a first response message from the access node, wherein the first response message comprises the random access identification; wherein, the length of the random access identification is smaller than that of the temporary mobile user identification of the terminal equipment, and the length of the temporary mobile user identification is greater than or equal to 64 bits.
In the technical scheme of this embodiment, in the random access process, in consideration of the fact that the temporary mobile subscriber identity exceeds the limit of the length of the message exchanged between the terminal device and the access node, the composition structure of the random access identity sent and received by the terminal device does not directly include the expanded temporary mobile subscriber identity, but the terminal device generates the random access identity by itself.
According to the scheme of the embodiment of the application, when the length of the temporary mobile user identifier is greater than that of the random access identifier, the terminal equipment generates the random access identifier meeting the length requirement, so that the terminal equipment can normally access the wireless network in the random access process.
With reference to the first aspect, in some implementations of the first aspect, the terminal device sends a radio resource control, RRC, connection setup complete message to the access node; wherein, the RRC connection setup complete message includes a service temporary mobile subscriber identity of the terminal device, and the service temporary mobile subscriber identity includes the temporary mobile subscriber identity and an identity of the first access management node.
It should be understood that the RRC connection setup complete message has no length limitation, and may directly send the service temporary mobile subscriber identity after the length extension.
In the technical scheme of this embodiment, after the temporary mobile subscriber identity is extended to 64 bits or longer, the network device may allocate non-conflicting globally unique temporary subscriber identities to more subscribers, and may ensure a sufficient randomized field space in the globally unique temporary subscriber identity, which is higher in security.
With reference to the first aspect, in certain implementations of the first aspect, the generating, by the terminal device, the random access identifier includes: the terminal equipment generates the random access identification according to the temporary mobile user identification; or the terminal device generates the random access identifier through a specific algorithm according to a first globally unique temporary user identifier, wherein a composition structure of the first globally unique temporary user identifier comprises the temporary mobile user identifier; or, the terminal device generates a random number as the random access identifier.
With reference to the first aspect, in some implementation manners of the first aspect, optionally, the generating, by the terminal device, the random access identifier according to the temporary mobile subscriber identifier includes:
in some possible implementations, the random access identity is generated based on the temporary mobile user identity and a specific algorithm.
In some possible implementations, the random access identifier is generated based on the identifier of the first access management node, the temporary mobile subscriber identifier and a specific algorithm.
In some possible implementations, the random access identity is generated based on an identity associated with the first access management node, the temporary mobile subscriber identity and a specific algorithm.
In some possible implementations, the random access identifier is generated according to the temporary mobile subscriber identity, other fields in the serving temporary mobile subscriber identity and a specific algorithm.
In some possible implementations, the random access identifier is generated based on a part of fields in the identifier of the first access management node, the temporary mobile subscriber identifier and a specific algorithm.
With reference to the first aspect, in certain implementations of the first aspect, the method further includes: the terminal equipment sends a registration request message to the access node, wherein the registration request message comprises a first globally unique temporary user identifier, and the first globally unique temporary user identifier is distributed by the first access management node.
With reference to the first aspect, in certain implementations of the first aspect, after the terminal device sends the registration request message to the access node, the method further includes: receiving a registration acceptance message from the access node, wherein the registration acceptance message comprises a second globally unique temporary user identifier which is distributed by the first access management node or a second access management node; the second globally unique temporary user identifier is different from the first globally unique temporary user identifier, and the first access management node is different from the second access management node.
In a second aspect, a method for random access is provided, the method comprising: an access node receives a first request message from a terminal device, wherein the first request message is used for requesting to access a wireless network in a random access process, the first request message comprises a random access identifier, and the random access identifier is used for identifying the terminal device in the random access process; the access node sends a first response message to the terminal equipment, wherein the first response message comprises the random access identification; wherein, the length of the random access identification is smaller than that of the temporary mobile user identification of the terminal equipment, and the length of the temporary mobile user identification is greater than or equal to 64 bits.
In the technical scheme of this embodiment, in the random access process, in consideration of the fact that the temporary mobile subscriber identity exceeds the limit of the length of the message exchanged between the terminal device and the access node, the composition structure of the random access identity sent and received by the terminal device does not directly include the expanded temporary mobile subscriber identity, but the terminal device generates the random access identity by itself.
With reference to the second aspect, in certain implementations of the second aspect, the method further includes: the access node receives a Radio Resource Control (RRC) connection establishment completion message from the terminal equipment, wherein the RRC connection establishment completion message comprises a service temporary mobile user identifier, the service temporary mobile user identifier comprises the temporary mobile user identifier and an identifier of a first access management node, and the service temporary mobile user identifier is distributed by the first access management node; and the access node selects a second access management node for the terminal equipment according to the service temporary mobile user identification.
In the technical scheme of this embodiment, after the temporary mobile subscriber identity is extended to 64 bits or longer, the network device may allocate non-conflicting globally unique temporary subscriber identities to more subscribers, and may ensure a sufficient randomized field space in the globally unique temporary subscriber identity, which is higher in security.
With reference to the second aspect, in some implementations of the second aspect, after the access node receives the RRC connection setup complete message from the terminal device, the access node selects a second access management node for the terminal device, further including: the access node generates a first identifier according to the service temporary mobile user identifier; and when the first identifier is the same as the random access identifier, the access node selects a second access management node for the terminal equipment.
With reference to the second aspect, in some implementations of the second aspect, the generating, by the access node, the first identity from the serving temporary mobile subscriber identity includes:
in some possible implementations, the first identity is generated based on the temporary mobile subscriber identity and a specific algorithm.
In some possible implementations, the first identity is generated based on the identity of the first access management node, the temporary mobile subscriber identity and a specific algorithm.
It will be appreciated that the manner in which the access node generates the first identity is completely the same as the manner in which the terminal device generates the random access identity, so that the access node can verify the identity of the terminal device. When the terminal device generates the random access identifier according to a field except the service temporary mobile user identifier, or generates the random access identifier by using a random number, the access node cannot verify the identity of the terminal device in the scheme.
According to the scheme of the embodiment of the application, the access node verifies the identity of the terminal equipment after the random access process, and the accuracy and the safety of the random access process are further improved.
With reference to the second aspect, in certain implementations of the second aspect, the method further includes: the access node receives a registration request message from the terminal equipment; and sending the registration request message to the second access management node, wherein the registration request message comprises a first globally unique temporary user identifier, and the first globally unique temporary user identifier is allocated to the terminal equipment by the first access management node.
With reference to the second aspect, in certain implementations of the second aspect, the method further includes: the access node receives a registration acceptance message from the second access management node; the access node sends the registration acceptance message to the terminal device; wherein, the registration acceptance message includes a second globally unique temporary user identifier, and the second globally unique temporary user identifier is allocated to the terminal device by the second access management node; wherein the second globally unique temporary user identity is different from the first globally unique temporary user identity.
In a third aspect, an apparatus for random access is provided, the apparatus comprising: a processing module, configured to generate a random access identifier, where the random access identifier is used to identify the terminal device in a random access process; a transceiver module, configured to send a first request message to an access node, where the first request message includes the random access identifier, and the first request message is used to request access to a wireless network in a random access process; the transceiver module is further configured to receive a first response message from the access node, where the first response message includes the random access identifier, where the length of the random access identifier is smaller than the length of the temporary mobile subscriber identifier, and the length of the temporary mobile subscriber identifier is greater than or equal to 64 bits.
In the technical scheme of this embodiment, in the random access process, in consideration of the fact that the temporary mobile subscriber identity exceeds the limit of the length of the message exchanged between the terminal device and the access node, the composition structure of the random access identity sent and received by the terminal device does not directly include the expanded temporary mobile subscriber identity, but the terminal device generates the random access identity by itself.
According to the scheme of the embodiment of the application, when the length of the temporary mobile user identifier is greater than that of the random access identifier, the terminal equipment generates the random access identifier meeting the length requirement, so that the terminal equipment can normally access the wireless network in the random access process.
With reference to the third aspect, in some implementations of the third aspect, the transceiver module is further configured to send a radio resource control, RRC, connection setup complete message to the access node; wherein, the RRC connection setup complete message includes a service temporary mobile subscriber identity of the terminal device, and the service temporary mobile subscriber identity includes the temporary mobile subscriber identity and an identity of the first access management node.
In the technical scheme of this embodiment, after the temporary mobile subscriber identity is extended to 64 bits or longer, the network device may allocate non-conflicting globally unique temporary subscriber identities to more subscribers, and may ensure a sufficient randomized field space in the globally unique temporary subscriber identity, which is higher in security.
With reference to the third aspect, in some implementations of the third aspect, the processing module is specifically configured to: generating the random access identification according to the temporary mobile user identification; or, generating the random access identifier by a specific algorithm according to a first globally unique temporary user identifier, wherein a composition structure of the first globally unique temporary user identifier includes the temporary mobile user identifier; alternatively, a random number is generated as the random access identifier.
With reference to the third aspect, in some implementations of the third aspect, the processing module is further specifically configured to:
in some possible implementations, the random access identity is generated based on the temporary mobile subscriber identity and a specific algorithm.
In some possible implementations, the random access identifier is generated based on the identifier of the first access management node, the temporary mobile subscriber identifier and a specific algorithm.
In some possible implementations, the random access identity is generated based on an identity associated with the first access management node, the temporary mobile subscriber identity and a specific algorithm.
In some possible implementations, the random access identifier is generated according to the temporary mobile subscriber identity, other fields in the serving temporary mobile subscriber identity and a specific algorithm.
In some possible implementations, the random access identifier is generated according to a part of fields in the identifier of the first access management node, the temporary mobile subscriber identifier and a specific algorithm.
With reference to the third aspect, in some implementations of the third aspect, the transceiver module is further configured to: and sending a registration request message to the access node, wherein the registration request message comprises a first globally unique temporary user identifier which is distributed by the first access management node.
With reference to the third aspect, in some implementations of the third aspect, the transceiver module is further configured to: receiving a registration acceptance message from the access node, wherein the registration acceptance message comprises a second globally unique temporary user identifier which is distributed by the first access management node or a second access management node; the second globally unique temporary user identifier is different from the first globally unique temporary user identifier, and the first access management node is different from the second access management node.
In a fourth aspect, an apparatus for random access is provided, the apparatus comprising: a transceiver module, configured to receive a first request message from a terminal device, where the first request message is used to request access to a wireless network in a random access process, and the first request message includes a random access identifier, where the random access identifier is used to identify the terminal device in the random access process; the transceiver module is further configured to send a first response message to the terminal device, where the first response message includes the random access identifier, the length of the random access identifier is smaller than the length of the temporary mobile subscriber identifier of the terminal device, and the length of the temporary mobile subscriber identifier is greater than or equal to 64 bits.
In the technical scheme of this embodiment, in the random access process, in consideration of the fact that the temporary mobile subscriber identity exceeds the limit of the length of the message exchanged between the terminal device and the access node, the composition structure of the random access identity sent and received by the terminal device does not directly include the expanded temporary mobile subscriber identity, but the terminal device generates the random access identity by itself.
With reference to the fourth aspect, in some implementations of the fourth aspect, the transceiver module is further configured to receive a radio resource control, RRC, connection setup complete message from the terminal device, where the RRC connection setup complete message includes a serving temporary mobile subscriber identity, the serving temporary mobile subscriber identity includes the temporary mobile subscriber identity and an identity of a first access management node, and the serving temporary mobile subscriber identity is allocated by the first access management node; and the processing module is used for selecting a second access management node for the terminal equipment according to the service temporary mobile user identification.
With reference to the fourth aspect, in some implementations of the fourth aspect, the processing module is further configured to: generating a first identifier according to the service temporary mobile user identifier; and when the first identifier is the same as the random access identifier, the access node selects a second access management node for the terminal equipment.
With reference to the fourth aspect, in some implementations of the fourth aspect, the processing module is further specifically configured to:
in some possible implementations, the first identity is generated based on the temporary mobile subscriber identity and a specific algorithm.
In some possible implementations, the first identity is generated based on the identity of the first access management node, the temporary mobile subscriber identity and a specific algorithm.
With reference to the fourth aspect, in some implementations of the fourth aspect, the transceiver module is further configured to receive a registration request message from the terminal device; the transceiver module is further configured to send the registration request message to the second access management node, where the registration request message includes a first globally unique temporary user identifier, and the first globally unique temporary user identifier is allocated to the terminal device by the first access management node.
With reference to the fourth aspect, in some implementations of the fourth aspect, the transceiver module is further configured to: receiving a registration acceptance message from the second access management node, and sending the registration acceptance message to the terminal equipment; wherein, the registration acceptance message includes a second globally unique temporary user identifier, and the second globally unique temporary user identifier is allocated to the terminal device by the second access management node; wherein the second globally unique temporary user identity is different from the first globally unique temporary user identity.
In a fifth aspect, a communication apparatus is provided, the apparatus comprising: a processor and a memory; the memory for storing a computer program; the processor is configured to execute the computer program stored in the memory to enable the communication apparatus to execute the communication method in any one of the first to third possible implementation manners of the first aspect and the first aspect, or execute the communication method in any one of the first to third possible implementation manners of the second aspect and the second aspect.
A sixth aspect provides a computer-readable storage medium having stored thereon a computer program which, when run on a computer, causes the computer to perform the communication method as in the first aspect and any one of the first to third possible implementations of the first aspect, or the communication method as in the second aspect and any one of the first to third possible implementations of the second aspect.
In a seventh aspect, a chip system is provided, which includes: a processor configured to call and run a computer program from a memory, so that the communication device in which the system-on-chip is installed performs the communication method in any one of the first to third possible implementations of the first aspect and the first aspect, or performs the communication method in any one of the first to third possible implementations of the second aspect and the second aspect.
According to the scheme of the embodiment of the application, when the length of the temporary mobile user identifier is greater than that of the random access identifier, the terminal equipment generates the random access identifier meeting the length requirement, so that the terminal equipment can successfully access the wireless network in the random access process. Moreover, after the temporary mobile subscriber identity is expanded to 64 bits or more, the network device can allocate non-conflicting global unique temporary subscriber identities to more users, and can ensure enough randomized field space in the global unique temporary subscriber identity, so that the security is higher.
Drawings
Fig. 1 is a schematic diagram of a logical architecture of a mobile communication network.
Fig. 2 shows a schematic block diagram of a GUTI in a 4G network.
Fig. 3 shows a schematic block diagram of a 5G-GUTI in a 5G network.
Fig. 4 shows a schematic interaction diagram of a contention-based random access procedure.
Fig. 5 is a schematic interaction diagram of an example of the random access method of the present application.
Fig. 6 is another exemplary schematic interaction diagram of the method of random access of the present application.
Fig. 7 is a schematic block diagram of an example of a terminal device of the present application.
Fig. 8 is a schematic block diagram of an example of an access node of the present application.
Fig. 9 is a schematic block diagram of an example of a communication apparatus according to the present application.
Fig. 10 is a schematic block diagram of still another example of the communication apparatus of the present application.
Detailed Description
The technical solution in the present application will be described below with reference to the accompanying drawings.
As used in this application, the terms "component," "module," "system," and the like are intended to refer to a computer-related entity, either hardware, firmware, a combination of hardware and software, or software in execution. For example, a component may be, but is not limited to being, a process running on a processor, an object, an executable, a thread of execution, a program, and/or a computer. By way of illustration, both an application running on a computing device and the computing device can be a component. One or more components can reside within a process and/or thread of execution and a component can be localized on one computer and/or distributed between 2 or more computers. In addition, these components can execute from various computer readable media having various data structures stored thereon. The components may communicate by way of local and/or remote processes such as in accordance with a signal having one or more data packets (e.g., data from two components interacting with another component in a local system, distributed system, and/or across a network such as the internet with other systems by way of the signal).
The technical scheme of the embodiment of the application can be applied to various communication systems, for example: a global system for mobile communications (GSM) system, a Code Division Multiple Access (CDMA) system, a Wideband Code Division Multiple Access (WCDMA) system, a General Packet Radio Service (GPRS), a long term evolution (long term evolution, LTE) system, a LTE Frequency Division Duplex (FDD) system, a LTE Time Division Duplex (TDD) system, a universal mobile telecommunications system (universal mobile telecommunications system, UMTS), a Worldwide Interoperability for Microwave Access (WiMAX) communication system, a fifth generation system or a New Radio (NR), a future communication system, and the like.
With the development of communication technology, mobile communication systems will support not only conventional communication but also, for example, device-to-device (D2D) communication, machine-to-machine (M2M) communication, Machine Type Communication (MTC), vehicle networking (V2X) communication, for example, vehicle-to-vehicle (V2V) communication, vehicle-to-infrastructure (V2I) communication, vehicle-to-pedestrian (V2P) communication, vehicle-to-network (V2N) communication.
Fig. 1 is a schematic diagram of a logical architecture of a mobile communication network, and each network element that may be involved in the logical architecture of the network is described below.
1. The terminal equipment: may include various handheld devices, vehicle-mounted devices, wearable devices, computing devices or other processing devices connected to a wireless modem with wireless communication capabilities, as well as various forms of terminals, Mobile Stations (MSs), terminals (terminals), User Equipment (UEs), soft terminals, and so forth. Such as water meters, electricity meters, sensors, etc.
2. The access node: the method and the device are used for providing a network access function for authorized terminal equipment in a specific area, and can use transmission tunnels with different qualities according to the grade of the terminal equipment, the service requirement and the like.
The access node may be a (radio access network, (R) AN network element, and is configured to manage radio resources, provide AN access service for the terminal device, and further complete forwarding of a control signal and terminal device data between the terminal device and the core network, where the (R) AN network element may also be understood as a base station in a conventional network.
It should be noted that the "network element" may also be referred to as an entity, a device, an apparatus, a module, or the like, and the application is not particularly limited. Also, in the present application, for convenience of understanding and explanation, a description of "network element" is omitted in a part of the description, for example, AN (R) AN network element is abbreviated as (R) AN, in which case the "(R) AN network element" is understood as AN (R) AN network element or AN (R) AN entity, and explanation of the same or similar case is omitted below.
The access node may also comprise a Centralized Unit (CU) node, or a Distributed Unit (DU) node, or a RAN device comprising a CU node and a DU node, or a control plane CU node (CU-CP node) and a user plane CU node (CU-UP node) and a DU node.
3. An access management node: the method is mainly used for mobility management, access management and the like. In particular, the method may be used to implement other functions besides session management in Mobility Management Entity (MME) functions, for example, functions of lawful interception and access authorization/authentication.
In the 5G communication system, the access management network element may be an access and mobility management function (AMF) network element. In a future communication system, the access management network element may still be an AMF network element, or may also have another name, which is not limited in this application.
4. A data management function network element: the method is used for processing terminal equipment identification, access authentication, registration, mobility management and the like.
In the 5G communication system, the data management network element may be a Unified Data Management (UDM) network element. In future communication systems, the unified data management may still be a UDM network element, or may also have other names, which is not limited in this application.
Before describing the embodiments of the present application, first, a few identification names related to the embodiments of the present application are briefly described, which may be corresponding identifications in the 4G or 5G systems mentioned in the present application. It should be noted that in the following communication systems, these identifiers may follow the existing identifier name, or may be other identifier names, which is not limited in this application.
1. Globally unique temporary user identification
In a wireless network, a permanent identifier of a terminal device may be used to uniquely identify the terminal device, such as an International Mobile Subscriber Identity (IMSI). However, there is a security risk that the wireless network directly transfers the permanent identity, and for this reason the network device assigns a globally unique temporary user identity to the terminal device. The globally unique temporary user identifier is used for temporarily and uniquely identifying the terminal equipment.
To further increase security, the network device will also constantly update the globally unique temporary user identity of the terminal device. For example, the globally unique temporary user identifier may be a globally unique temporary user identifier (GUTI) in a fourth generation (4th generation, 4G) system, or a globally unique temporary user identifier (5G-GUTI) in a fifth generation (5th generation, 5G) system. Fig. 2 is a schematic diagram of a globally unique temporary user identifier in a 4G system, and fig. 3 is a schematic diagram of a globally unique temporary user identifier in a 5G system.
2. Temporary mobile subscriber identity
In order to enable the network device to quickly find the context of the locally stored terminal device according to the globally unique temporary user identifier, when the globally unique temporary user identifier is allocated to the terminal device, the temporary mobile user identifier of the terminal device is used as a partial field in the globally unique temporary user identifier.
Furthermore, a randomized field is reserved in the temporary mobile subscriber identity so that the globally unique temporary subscriber identity of the terminal device can be changed frequently.
Specifically, the temporary mobile subscriber identity may be an M-TMSI (MME-temporal mobile subscriber identity) in a 4G system, or a 5G-TMSI (5G-temporal mobile subscriber identity) in a 5G system. The temporary mobile subscriber identity may be, for example, the M-TMSI in fig. 2 or the 5G-TMSI in fig. 3.
The network device may be an AMF in a 5G system, an MME in a 4G system, or other network-side device storing the context of the terminal device, which is not limited.
3. Serving temporary mobile subscriber identities
In order to enable other devices within the wireless network to be addressed to the above-mentioned network device serving the terminal device, the network device, when assigning the globally unique temporary user identity, will take the network device identity used for identifying the network device as some field in the globally unique temporary user identity. The service temporary mobile user identification is composed of the temporary mobile user identification and the network equipment identification. The serving temporary mobile subscriber identity may be a S-TMSI (serving-temporal mobile subscriber identity) in a 4G system or a 5G-S-TMSI (5G-S serving-temporal mobile subscriber identity) in a 5G system. The serving temporary mobile subscriber identity may be the S-TMSI in figure 2 or the 5G-S-TMSI in figure 3.
In other words, other devices in the wireless network may first address the network device serving the terminal device according to the network identifier in the serving temporary mobile subscriber identifier, and then find the context of the terminal device in the network device according to the temporary mobile subscriber identifier in the serving temporary mobile subscriber identifier.
4. Random access identification
The random access identity is used to identify the terminal device during a random access procedure. Specifically, the terminal device sends a random access identifier to the network device, the network device sends the random access identifier to the terminal device after determining that the terminal device is allowed to access the wireless network, and the terminal device learns that the random access is successful according to the consistency of the received random access identifier and the random access identifier sent by the terminal device. The random access identifier may be a radio access user identifier as shown in fig. 2 in an existing 4G network, and has a length of 40 bits, including M-TMSI and MME Code; in the 5G network, the random access identifier and the radio access user identifier in fig. 3 have the same structure, have the length of 39 bits, and comprise 5G-TMSI and some fields related to AMF identifier.
The random access procedure is described below.
The random access procedure refers to a procedure from a user sending a random access preamble sequence to an attempt to access a network to a basic signaling connection established between the user and the network, and is one of the most basic requirements for any cellular communication system, and is used for enabling the terminal to establish data communication with a network side. The random access process is divided into: a contention based random access procedure and a non-contention based random access procedure, fig. 4 shows 4 steps of the contention based random access procedure, including:
s401, the terminal equipment sends a random access preamble sequence (preamble) to an access node;
s402, the access node broadcasts a random access response, and the terminal equipment obtains information sent by the access node by reading a system broadcast message;
s403, the terminal device sends an initial uplink transmission message to the access node.
And after receiving the random access response, the terminal transmits the message on the allocated uplink resource. There may be a plurality of terminal devices reading the system broadcast message of the access node, and selecting the same resource to access simultaneously, so in the message in this step, the terminal device carries the identifier of the terminal device, that is, the identifier of the existing wireless access user. For example, a 40-bit long S-TMSI as shown in FIG. 2; or a radio access subscriber identity as shown in fig. 3, with a length of 39 bits. As can be seen from the figure, the composition structure of the wireless access user identifier includes a temporary mobile user identifier.
S404, the access node sends a competition resolving message to the terminal equipment.
Illustratively, if the terminal device wins in the conflict resolution, the access node returns the wireless access user identification of the winning terminal device to the terminal device. And the terminal equipment acquires that the access of the terminal equipment is successful according to the consistency between the received wireless access user identification and the wireless access user identification transmitted by the terminal equipment. Subsequently, the terminal device may send a registration request message to the network side for network registration.
It should be noted that the radio access subscriber identity is of a limited length, for example, 40 bits cannot be exceeded in a 4G system, and 39 bits cannot be exceeded in a 5G system. The above-mentioned wireless access user identification includes temporary mobile user identification.
Currently, the length of the temporary mobile subscriber identity is 32 bits, and in order to support millions or even tens of millions of users and ensure that the allocated temporary identities do not conflict, the length of the temporary mobile subscriber identity may be extended to 64 bits or more. After the temporary mobile subscriber identity is extended, if the existing structure of the radio access subscriber identity is still used, the length of the radio access subscriber identity exceeds the length limit, resulting in access failure of the terminal device.
For example, when the length of the extended temporary mobile subscriber identity is greater than or equal to 64 bits, in step 3 of the random access procedure, if the radio access subscriber identity still continues to use the existing composition structure, its length may exceed the length limit of the "initial uplink transmission message" sent by the terminal device, resulting in a random access failure.
Fig. 5 shows an exemplary schematic interaction diagram of a method 500 for random access of the present application, the method 500 being performed by a terminal device and an access node, as described below.
S501, the terminal equipment generates a random access identifier.
The random access identifier is used for identifying the terminal equipment in the random access process.
Optionally, the length of the random access identifier meets a length requirement, that is, is less than or equal to a first preset length, so as to satisfy normal transmission of the first request message between the terminal device and the access node. For example, the first preset length is a restriction length of the radio access subscriber identity, that is, the length of the random access identity may be less than or equal to the restriction length of the radio access subscriber identity, such as 40 bits in a 4G system and 39 bits in a 5G system. That is, the "random access flag" here is required to have a length of 40 bits in the existing 4G communication system, and a length of 39 bits in the existing 5G communication system, and the length requirement in the subsequent communication system may or may not be the same as that in the existing system, and the present application is not limited thereto.
Optionally, in the extended temporary mobile subscriber identity scenario, assuming that the length of the extended temporary mobile subscriber identity is greater than or equal to 64 bits, the length of the random access identity is smaller than the length of the extended temporary mobile subscriber identity.
As an example, this step is between the second mutual information and the third mutual information in the random access procedure, i.e. between the terminal device receiving the random access response message from the access node (corresponding to S402 in fig. 4) and the terminal device sending the initial uplink transmission message to the access node (corresponding to S403 in fig. 4).
In the application, the terminal device generates a random access identifier which meets the requirement of the message length and can identify the terminal device. The "terminal device capable of being identified" does not necessarily require that the constituent structure of the random access identifier includes a field of the temporary mobile subscriber identifier, for example, the terminal device may generate a random access identifier meeting the length requirement based on the temporary mobile subscriber identifier, or may use a random number generated according to the length requirement as the random access identifier, as described below.
In the first mode, the terminal device generates a random access identifier according to the temporary mobile user identifier.
In an alternative implementation, the terminal device generates the random access identifier according to the temporary mobile subscriber identifier and a specific algorithm. For example, in a 4G network, the M-TMSI in fig. 2 may generate a random access identity through a specific algorithm; in a 5G network, the random access identity may be generated by the 5G-TMSI in fig. 3 through a specific algorithm.
In another alternative implementation, the random access identifier is generated according to the identifier of the first access management node, the temporary mobile subscriber identifier and a specific algorithm. For example, in a 4G network, the random access identifier may be generated by a specific algorithm for the M-TMSI and MME Code, i.e., S-TMSI in FIG. 2, or by a specific algorithm for the M-TMSI, MME Code, and MME Group ID together. In the 5G network, the random access identifiers can be generated by the 5G-TMSI and the AMF Pointer through a specific algorithm, or the random access identifiers can be generated by the 5G-TMSI, the AMF Pointer and the AMF Set ID, namely the 5G-S-TMSI, through a specific algorithm, or the random access identifiers can be generated by the 5G-S-TMSI and the AMF Region ID through a specific algorithm.
In another optional implementation, the terminal device generates the random access identifier according to a partial field of the identifier of the first access management node, the temporary mobile subscriber identifier, and a specific algorithm. For example, the random access identifier may be generated by a specific algorithm from the radio access user identifier in fig. 3, or may be generated by a specific algorithm from 1 bit in the AMF Set ID together with the AMF Pointer, 5G-TMSI.
And secondly, the terminal equipment generates a random access identifier according to the first globally unique temporary user identifier and a specific algorithm.
As an example, the whole GUTI in the 4G network is used to generate a 40-bit random access identifier through a specific algorithm; or the whole 5G-GUTI in the 5G network generates 39 bits of random access identification through a specific algorithm.
It should be noted that the above-mentioned "specific algorithm" may be a hash digest algorithm, and is not limited.
And in the third mode, the terminal equipment generates a random number as the random access identifier.
The length of the random number is only required to meet the length requirement, namely is less than or equal to a first preset length.
S502, the terminal device sends a first request message to the access node, wherein the first request message comprises the random access identifier.
The first request message may be used to request access to the wireless network in a random access process, and specifically may be a random access request message or an uplink initial transmission message, which is not limited.
Illustratively, the terminal device sends a radio resource control RRC connection setup request message to the access node, where the message includes a first request message, and the first request message includes the random access identifier generated by the terminal device in step S501.
S503, the access node sends a first response message to the terminal device, wherein the first response message includes a random access identifier.
It should be understood that the access node will send the random access identifier of the terminal device that is winning in the contention of random access to the terminal device in the first response message, and if the received random access identifier is the random access identifier of the terminal device, the terminal device knows that the access is successful.
Illustratively, the access node sends an RRC connection setup response message to the terminal device, where the RRC connection setup response message includes the first response message.
The first response message is used for responding to the first request message, and may specifically be a contention resolution message in a random access process, which is not limited.
Based on the method provided by the embodiment, the terminal device can generate the random access identifier meeting the length requirement, and the random access identifier is used for identifying the terminal device in the random access process, so that the terminal device can normally access the wireless network in the random access process. The method can avoid access failure caused by random access by adopting the existing wireless mobile user identification after the temporary mobile user identification is expanded to 64 bits or longer.
Optionally, in an implementation scenario of the foregoing embodiment, after step S503, the method further includes: the terminal equipment sends a Radio Resource Control (RRC) connection establishment completion message to the access node, wherein the RRC connection establishment completion message comprises a service temporary mobile user identifier, and the service temporary mobile user identifier comprises a temporary mobile user identifier and an identifier of the first access management node.
It should be understood that after the random access is successful, that is, after the RRC connection is established, the terminal device sends an RRC connection establishment complete message to the access node, where the message carries the service temporary mobile subscriber identity.
Wherein the serving temporary mobile subscriber identity may be used to identify a context of the terminal device in the first access management node.
Optionally, in a scenario of extending the temporary mobile subscriber identity, the service temporary mobile subscriber identity includes an extended temporary mobile subscriber identity. Since the RRC connection setup complete message has no message length limitation, the message may directly carry the serving temporary mobile subscriber identity. For example, in a 4G communication system, a terminal device sends S-TMSI to an access node, wherein the length of the included M-TMSI is greater than or equal to 64 bits; or in a 5G communication system, the terminal device sends a 5G-S-TMSI to the access node, wherein the length of the included 5G-TMSI is greater than or equal to 64 bits.
In addition, the RRC connection setup complete message further includes a non-access stratum (NAS) message, and the NAS message is a registration request message.
Wherein, the registration request message includes a first globally unique temporary user identifier, and the identifier is allocated by the first access management node. For example, in a 4G communication system, a terminal device sends a first GUTI to an access node; or in a 5G communication system, the terminal device sends the first 5G-GUTI to the access node.
Further, after receiving the RRC connection setup complete message, the access node may also verify the identity of the terminal device. Specifically, the access node may generate the first identifier according to the serving temporary mobile subscriber identifier; and if the first identifier is the same as the random access identifier, the identity authentication of the terminal equipment is successful.
In an alternative implementation, the access node generates the first identifier according to the temporary mobile subscriber identifier and a specific algorithm. For example, if the terminal device generates the random access identifier according to the temporary mobile subscriber identity and a specific algorithm in step S501, the access node may generate the first identifier according to the temporary mobile subscriber identity in the composition of the serving temporary mobile subscriber identity in the RRC connection setup complete message and the specific algorithm.
In another alternative implementation, the access node generates the first identifier according to the identifier of the first access management node, the temporary mobile subscriber identifier, and a specific algorithm. For example, if the terminal device generates the random access identifier according to the temporary mobile subscriber identifier, the identifier of the first access management node and a specific algorithm in step S501, the access node may generate the first identifier according to the temporary mobile subscriber identifier and the identifier of the first access management node in the composition structure of the serving temporary mobile subscriber identifier in the RRC connection setup complete message and the specific algorithm.
The specific algorithm may be, without limitation, a hash digest algorithm.
In particular, if the terminal device uses a random number generation method or a field not included in the serving temporary mobile subscriber identity is included in the identity before the random access identity is generated by a specific algorithm in S501, the access node cannot verify the identity of the terminal device.
If the first identifier is consistent with the random access identifier received by the access node in step S502, the terminal device is allowed to trigger a registration procedure, that is, a second access management node is selected for the terminal device, and then the service temporary mobile subscriber identifier is sent to the second access management node.
Based on the scheme of the embodiment, the access node verifies the identity of the terminal equipment after the random access process, and the accuracy and the safety of the random access process are further improved.
Subsequently, the access node forwards a registration request message to the second access management node, wherein the registration request message comprises the first global temporary user identifier. The first global temporary subscriber identity is assigned by a first access management node, which may be the same as or different from a second access management node. Further, after receiving the registration request of the terminal device, the second access management node may allocate a global temporary user identifier to the terminal device, which may be referred to as a second global temporary user identifier in this application. And the second access management node carries the second global temporary user identification in a registration acceptance message and sends the registration acceptance message to the terminal equipment.
It should be noted that, regardless of whether the terminal device is assigned with the second global temporary user identifier by the second access management node or the first access management node, the second global temporary user identifier is different from the first global temporary user identifier.
According to the scheme of the embodiment of the application, the terminal equipment generates the random access identifier meeting the length requirement, so that the terminal equipment can normally access the wireless network in the random access process. Moreover, after the temporary mobile subscriber identity is expanded to 64 bits or more, the network device can allocate non-conflicting global unique temporary subscriber identities to more users, and can ensure enough randomized field space in the global unique temporary subscriber identity, so that the security is higher.
Fig. 6 shows a schematic interaction diagram of a method 600 for random access according to an embodiment of the present application.
S601, the terminal device sends a random access leader sequence to the access node.
Illustratively, when accessing a wireless network, a terminal device triggers a random access procedure, requests an access node to allocate uplink resources through the random access procedure, and establishes uplink synchronization with the access node. The terminal device may randomly select a preamble sequence as a random access preamble sequence and send it to the access node on a random access channel.
S602, the access node broadcasts a random access response, and the terminal equipment receives the random access response.
Illustratively, after detecting the random preamble sequence sent by the terminal device, the access node may send a random access response through a system broadcast message.
The random access response may include the random access preamble sequence received in S601, information of uplink resources allocated to the terminal device, and the like.
S603, the terminal equipment generates a random access identification according to the temporary mobile user identification.
Specifically, the first manner in the embodiment shown in fig. 5 may be referred to by the terminal device for generating the random access identifier according to the temporary mobile subscriber identifier. For example, the random access identifier with the same length is generated according to the temporary mobile user identifier and a specific algorithm.
Alternatively, in the 4G network, the terminal device generates the random access identifier with the length of 40 bits by using the M-TMSI with the length of 64 bits or longer through a specific algorithm. Or in the 5G network, the terminal equipment generates a random access identifier with the length of 39 bits by using 5G-TMSI with the length of 64 bits or more through a specific algorithm.
The specific algorithm may be a hash digest algorithm, or other algorithms capable of implementing similar functions, which is not limited in this embodiment.
S604, the terminal equipment sends a first request message to the access node on the allocated uplink resource.
Wherein the first request message includes the random access identifier in S603.
It should be understood that after step S602, there may be a plurality of terminal devices reading the system broadcast message of the access node, and selecting the same resource for simultaneous access. Therefore, in this step, the terminal device sends an RRC connection establishment request message on the allocated uplink resource, where the message includes the random access identifier, so that the terminal device can determine that its random access is successful after receiving a contention resolution message including the same random access identifier in the next step.
S605, the access node sends a first response message to the terminal equipment, wherein the first response message comprises a random access identifier.
Illustratively, the access node sends a first response message to the terminal device after determining that the terminal device is allowed to access the wireless network.
S606, the terminal device sends an RRC connection setup complete message to the access node, where the RRC connection setup complete message includes a service temporary mobile subscriber identity.
The service temporary mobile subscriber identity may refer to the related description in the embodiment shown in fig. 5, and is not described again.
Illustratively, the terminal device determines that the terminal device has successfully accessed according to the random access identifier included in the received contention resolution message, and then triggers a registration process.
The terminal equipment sends an RRC connection establishment completion message to the access node, wherein the RRC connection establishment completion message comprises a service temporary mobile user identification, and the service temporary mobile user identification comprises a temporary mobile user identification with the length being more than or equal to 64 bits.
Meanwhile, the RRC connection setup complete message may further include a registration request message sent by the NAS layer, where the message includes a globally unique temporary user identifier, and a composition structure of the globally unique temporary user identifier includes the temporary mobile user identifier with the length greater than or equal to 64 bits.
S607, the access node generates a first identity.
The access node generates a random access identifier according to the temporary mobile subscriber identifier and the specific algorithm in step S603 of the terminal device, and then, after receiving the RRC connection setup complete message, the access node generates the first identifier according to the temporary mobile subscriber identifier included in the received service temporary mobile subscriber identifier and the same specific algorithm in step S603. If the first identifier is consistent with the random access identifier in the initial uplink transmission message received by the access node, the identity of the terminal equipment is verified, and the access node allows the terminal equipment to trigger a registration process.
For example, in a 4G network, an access node generates a first identity according to M-TMSI and a specific algorithm; or in a 5G network the access node generates the first identity according to the 5G-TMSI and a specific algorithm.
S608, the access node selects a second access management node for the terminal device according to the service temporary mobile user identification.
S609, the access node sends a registration request message to the second access management node, wherein the registration request message comprises the first global unique temporary user identification.
And the second access management node determines a first access management node serving the terminal equipment before according to the received globally unique temporary user identifier, wherein the first access management node and the second access management node can be the same or different. And the second access management node acquires the user context of the terminal equipment.
Specifically, when the first access management node is the same as the second access management node, the second access management node obtains the locally stored user context of the terminal device according to the temporary mobile user identifier included in the globally unique temporary user identifier. When the first access management node is different from the second access management node, the second access management node sends the received globally unique temporary user identifier to the first access management node, and the first access management node acquires the locally stored user context of the terminal device according to the temporary mobile user identifier contained in the globally unique temporary user identifier and sends the user context to the second access management node.
S610 to S613, the second access management node registers to the data management function, sends an access management node registration request message to the data management function, and receives an access management node registration response message sent by the data management function; and the second access management node sends a signing data acquisition request to the data management function, receives a signing data acquisition response sent by the data management function and acquires the signing data of the terminal equipment.
S614, the second access management node sends a registration acceptance message to the terminal equipment, wherein the registration acceptance message comprises the second globally unique temporary user identifier.
Wherein the second globally unique temporary user identifier is a globally unique temporary user identifier assigned to the terminal device by the second access management node.
Specifically, after the registration is completed, the second access management node may allocate the second globally unique temporary user identifier to the terminal device, that is, send a registration acceptance message to the terminal device, where the message includes the second globally unique temporary user identifier. The access management node sends a registration acceptance message to the access node through the NAS layer, and the access node forwards the registration acceptance message to the terminal equipment.
S615, the terminal device sends a registration completion message to the second access management node.
According to the scheme of the embodiment of the application, after the length of the temporary mobile user identifier is extended, the terminal equipment generates the random access identifier meeting the length requirement, so that the terminal equipment can normally access the wireless network in the random access process. Moreover, after the temporary mobile subscriber identity is expanded to 64 bits or more, the network equipment can allocate non-conflicting global unique temporary subscriber identities to more users, and can ensure enough randomized field space in the global unique temporary subscriber identity, so that the security is higher. Furthermore, the access node verifies the identity of the terminal equipment after the random access process, and the accuracy and the safety of the random access process are further improved.
The method provided by the embodiment of the present application is described in detail above with reference to fig. 5 to 6. Hereinafter, the communication device according to the embodiment of the present application will be described in detail with reference to fig. 7 to 10.
Fig. 7 is a schematic block diagram of a communication device provided in an embodiment of the present application. As shown, the communication device 10 may include a transceiver module 11 and a processing module 12.
In one possible design, the communication device 10 may correspond to the terminal device in the above method embodiment. For example, it may be a user equipment or a chip configured in the user equipment.
Specifically, the communication apparatus 10 may correspond to the method 500 and the terminal device in the method 500 according to the embodiment of the present application, and the communication apparatus 10 may include a module for performing the method performed by the terminal device in the method 500 in fig. 5 or the method 600 in fig. 6. Also, the units and other operations and/or functions in the communication device 10 are respectively for realizing the corresponding flows of the method 500 in fig. 5 or the method 600 in fig. 6.
When the communication device 10 is used to execute the method 500 in fig. 5, the transceiver module 11 may be used to execute steps S502 and S503 in the method 500, and the processing module 12 may be used to execute step S501 in the method 500.
When the communication device 10 is configured to execute the method 600 in fig. 6, the transceiver module 11 may be configured to execute steps S601, S602, S604, S605, S606, S614, and S615 in the method 600, and the processing module 12 may be configured to execute step S603 in the method 600.
Specifically, the processing module 12 is configured to generate a random access identifier, where the random access identifier is used to identify the terminal device in a random access process; the transceiver module 11 is configured to send a first request message to an access node, where the first request message includes the random access identifier, and the first request message is used to request access to a wireless network in a random access process; and the ue is further configured to receive a first response message from the access node, where the first response message includes the random access identifier, where the length of the random access identifier is smaller than the length of a temporary mobile subscriber identifier of the terminal device, and the length of the temporary mobile subscriber identifier is greater than or equal to 64 bits.
Optionally, the transceiver module 11 is further configured to send a radio resource control, RRC, connection setup complete message to the access node, where the RRC connection setup complete message includes a serving temporary mobile subscriber identity, and the serving temporary mobile subscriber identity includes the temporary mobile subscriber identity and an identity of the first access management node.
Optionally, the processing module 12 is specifically configured to generate the random access identifier according to the temporary mobile subscriber identifier; or, generating the random access identifier by a specific algorithm according to a first globally unique temporary user identifier, wherein a composition structure of the first globally unique temporary user identifier includes the temporary mobile user identifier; alternatively, a random number is generated as the random access identifier.
The processing module 12 is further specifically configured to generate the random access identifier according to the temporary mobile subscriber identifier and a specific algorithm; or, the random access identifier is generated according to the identifier of the first access management node, the temporary mobile user identifier and a specific algorithm.
The transceiver module 11 is further configured to send a registration request message to the access node, where the registration request message includes a first globally unique temporary user identifier, and the first globally unique temporary user identifier is allocated by the first access management node. The transceiver module 11 receives a registration acceptance message from the access node, where the registration acceptance message includes a second globally unique temporary user identifier, and the second globally unique temporary user identifier is allocated by the first access management node or a second access management node; the second globally unique temporary user identifier is different from the first globally unique temporary user identifier, and the first access management node is different from the second access management node.
Fig. 8 is a schematic block diagram of a communication device provided in an embodiment of the present application. As shown, the communication device 20 may include a transceiver module 21 and a processing module 22.
In one possible design, the communication device 20 may correspond to an access node in the above method embodiment. For example, it may be a RAN or a chip configured in a RAN.
Specifically, the communication apparatus 20 may correspond to the network device in the method 500 and the method 600 according to the embodiment of the present application, and the communication apparatus 20 may include a module for performing the method performed by the network device in the method 500 in fig. 5 or the method 600 in fig. 6. Also, the units and other operations and/or functions described above in the communication device 20 are respectively for implementing the corresponding flows of the method 500 in fig. 5 or the method 600 in fig. 6.
When the communication device 20 is configured to execute the method 500 in fig. 5, the transceiver module 21 is configured to execute steps S502 and S503 in the method 500.
When the communication device 20 is configured to execute the method 600 in fig. 6, the transceiver module 21 may be configured to execute steps S601, S602, S604, S605, S606, S609, S614, and S615 in the method 600, and the processing module 22 may be configured to execute steps S607 and S608 in the method 600.
Specifically, the transceiver module 21 is configured to receive a first request message from a terminal device, where the first request message is used to request access to a wireless network in a random access process, and the first request message includes a random access identifier, where the random access identifier is used to identify the terminal device in the random access process; and is further configured to send a first response message to the terminal device, where the first response message includes the random access identifier, where a length of the random access identifier is smaller than a length of a temporary mobile subscriber identifier of the terminal device, and the length of the temporary mobile subscriber identifier is greater than or equal to 64 bits.
Optionally, the transceiver module 21 is further configured to receive a radio resource control, RRC, connection setup complete message from the terminal device, where the RRC connection setup complete message includes a serving temporary mobile subscriber identity, and the serving temporary mobile subscriber identity includes the temporary mobile subscriber identity and an identity of the first access management node. And a processing module 22, configured to select a second access management node for the terminal device according to the serving temporary mobile subscriber identity.
Specifically, the processing module 22 is further configured to generate a first identifier according to the serving temporary mobile subscriber identifier; and when the first identifier is the same as the random access identifier, the access node selects a second access management node for the terminal equipment. Optionally, the processing module 22 is further specifically configured to generate the first identifier according to the temporary mobile subscriber identifier and a specific algorithm; or, the first identifier is generated according to the identifier of the first access management node, the temporary mobile subscriber identifier and a specific algorithm.
In addition, the transceiver module 21 is further configured to receive a registration request message from the terminal device;
the transceiver module 21 is further configured to send the registration request message to the second access management node, where the registration request message includes a first globally unique temporary user identifier, and the first globally unique temporary user identifier is allocated by the first access management node for the terminal device. The transceiver module 21 is further configured to receive a registration acceptance message from the second access management node, and send the registration acceptance message to the terminal device, where the registration acceptance message includes a second globally unique temporary user identifier, and the second globally unique temporary user identifier is allocated to the terminal device by the second access management node; wherein the second globally unique temporary user identity is different from the first globally unique temporary user identity.
Fig. 9 is a schematic diagram of a communication apparatus 30 according to an embodiment of the present invention, and as shown in fig. 9, the apparatus 30 may be a terminal device, including various handheld devices, vehicle-mounted devices, wearable devices, computing devices or other processing devices connected to a wireless modem, and various forms of terminals, mobile stations, terminals, user equipment, soft terminals, and the like, and may also be a chip or a chip system located on the terminal device.
The apparatus 30 may include a processor 31 (i.e., an example of a processing module) and a memory 32. The memory 32 is configured to store instructions, and the processor 31 is configured to execute the instructions stored in the memory 32, so as to enable the apparatus 30 to implement the steps performed by the terminal device in the corresponding method in fig. 5 or fig. 6.
Further, the apparatus 30 may further include an input port 33 (i.e., one side of the transceiver module) and an output port 34 (i.e., another side of the transceiver module). Further, the processor 31, the memory 32, the input port 33 and the output port 34 may communicate with each other via internal connection paths, passing control and/or data signals. The memory 32 is used for storing a computer program, and the processor 31 may be used for calling and running the computer program from the memory 32 to control the input port 33 to receive signals and the output port 34 to send signals, so as to complete the steps of the terminal device in the above method. The memory 32 may be integrated in the processor 31 or may be provided separately from the processor 31.
Alternatively, if the communication device 30 is a communication device, the input port 33 is a receiver and the output port 34 is a transmitter. Wherein the receiver and the transmitter may be the same or different physical entities. When the same physical entity, may be collectively referred to as a transceiver.
Alternatively, if the communication device 30 is a chip or a circuit, the input port 33 is an input interface, and the output port 34 is an output interface.
As an implementation manner, the functions of the input port 33 and the output port 34 may be realized by a transceiver circuit or a dedicated chip for transceiving. The processor 31 may be considered to be implemented by a dedicated processing chip, processing circuitry, a processor, or a general purpose chip.
As another implementation manner, a manner of using a general-purpose computer to implement the communication device provided in the embodiment of the present application may be considered. Program codes that implement the functions of the processor 31, the input port 33, and the output port 34 are stored in the memory 32, and a general-purpose processor implements the functions of the processor 31, the input port 33, and the output port 34 by executing the codes in the memory 32.
Each module or unit in the communication apparatus 30 may be configured to execute each action or processing procedure executed by a device (e.g., a terminal device) performing random access in the foregoing method, and a detailed description thereof is omitted here for avoiding redundant description.
For the concepts, explanations, details and other steps related to the technical solutions provided in the embodiments of the present application related to the apparatus 10, reference is made to the descriptions of the foregoing methods or other embodiments, which are not repeated herein.
Fig. 10 is a schematic diagram of a communication apparatus 40 provided in an embodiment of the present application, and as shown in fig. 10, the apparatus 40 may be an access node including a network element, such as RAN, that provides an access function for a terminal device.
The apparatus 40 may include a processor 41 (i.e., an example of a processing module) and a memory 42. The memory 42 is configured to store instructions, and the processor 41 is configured to execute the instructions stored in the memory 42, so as to enable the apparatus 40 to implement the steps performed by the access node in the corresponding method in fig. 5 or fig. 6.
Further, the apparatus 40 may further include an input port 43 (i.e., one side of the transceiver module) and an output port 44 (i.e., the other side of the transceiver module). Further, the processor 41, the memory 42, the input port 43 and the output port 44 may communicate with each other via internal connection paths, passing control and/or data signals. The memory 42 is used for storing a computer program, and the processor 41 can be used for calling and running the computer program from the memory 42 to control the input port 43 to receive signals and the output port 44 to send signals, so as to complete the steps of the terminal device in the above method. The memory 42 may be integrated in the processor 41 or may be provided separately from the processor 41.
Alternatively, if the communication device 40 is a communication device, the input port 43 is a receiver and the output port 44 is a transmitter. Wherein the receiver and the transmitter may be the same or different physical entities. When the same physical entity, may be collectively referred to as a transceiver.
Alternatively, if the communication device 40 is a chip or a circuit, the input port 43 is an input interface, and the output port 44 is an output interface.
As an implementation manner, the functions of the input port 43 and the output port 44 may be realized by a transceiver circuit or a dedicated chip for transceiving. The processor 41 may be considered to be implemented by a dedicated processing chip, processing circuitry, a processor, or a general-purpose chip.
As another implementation manner, a manner of using a general-purpose computer to implement the communication device provided in the embodiment of the present application may be considered. Program codes that will realize the functions of the processor 41, the input port 43, and the output port 44 are stored in the memory 42, and the general-purpose processor realizes the functions of the processor 41, the input port 43, and the output port 44 by executing the codes in the memory 42.
Each module or unit in the communication apparatus 40 may be configured to execute each action or processing procedure performed by the device (i.e., the access node) that accepts random access in the foregoing method, and a detailed description thereof is omitted here for avoiding redundancy.
For the concepts, explanations, details and other steps related to the technical solutions provided in the embodiments of the present application related to the apparatus 40, please refer to the descriptions of the foregoing methods or other embodiments, which are not repeated herein.
It should be understood that in the embodiments of the present application, the processor may be a Central Processing Unit (CPU), and the processor may also be other general-purpose processors, Digital Signal Processors (DSPs), Application Specific Integrated Circuits (ASICs), Field Programmable Gate Arrays (FPGAs) or other programmable logic devices, discrete gate or transistor logic devices, discrete hardware components, and the like. A general purpose processor may be a microprocessor or the processor may be any conventional processor or the like.
It will also be appreciated that the memory in the embodiments of the subject application can be either volatile memory or nonvolatile memory, or can include both volatile and nonvolatile memory. The non-volatile memory may be a read-only memory (ROM), a Programmable ROM (PROM), an Erasable PROM (EPROM), an Electrically Erasable PROM (EEPROM), or a flash memory. Volatile memory can be Random Access Memory (RAM), which acts as external cache memory. By way of example but not limitation, many forms of RAM are available, such as Static random access memory (Static RAM, SRAM), Dynamic Random Access Memory (DRAM), Synchronous Dynamic Random Access Memory (SDRAM), double data rate Synchronous SDRAM (DDR SDRAM), Enhanced SDRAM (ESDRAM), synchlink DRAM (SLDRAM), and direct rambus RAM (DR RAM).
Embodiments of the present application also provide a computer-readable storage medium, on which computer instructions for implementing the method performed by the terminal device or the method performed by the network device in the foregoing method embodiments are stored.
For example, the computer program, when executed by a computer, causes the computer to implement the method performed by the terminal device or the method performed by the network device in the above-described method embodiments.
Embodiments of the present application also provide a computer program product containing instructions, where the instructions, when executed by a computer, cause the computer to implement the method performed by the terminal device or the method performed by the network device in the foregoing method embodiments.
An embodiment of the present application further provides a communication system, where the communication system includes the network device and the terminal device in the foregoing embodiments, the network device is configured to receive a first request message and send a first response message, and the terminal device is configured to generate a random access identifier, send the first request message and receive the first response message, where the first request message and the first response message both include the random access identifier, the length of the random access identifier is greater than the length of a temporary mobile subscriber identifier of the terminal device, and the length of the temporary mobile subscriber identifier is greater than or equal to 64 bits.
The above embodiments may be implemented in whole or in part by software, hardware, firmware, or any combination thereof. When implemented in software, the above-described embodiments may be implemented in whole or in part in the form of a computer program product. The computer program product includes one or more computer instructions or computer programs. The procedures or functions according to the embodiments of the present application are wholly or partially generated when the computer instructions or the computer program are loaded or executed on a computer. The computer may be a general purpose computer, a special purpose computer, a network of computers, or other programmable device. The computer instructions may be stored on a computer readable storage medium or transmitted from one computer readable storage medium to another computer readable storage medium, for example, the computer instructions may be transmitted from one website, computer, server, or data center to another website, computer, server, or data center by wire (e.g., infrared, wireless, microwave, etc.). The computer-readable storage medium can be any available medium that can be accessed by a computer or a data storage device such as a server, data center, etc. that contains one or more collections of available media. The usable medium may be a magnetic medium (e.g., floppy disk, hard disk, magnetic tape), an optical medium (e.g., DVD), or a semiconductor medium. The semiconductor medium may be a solid state disk.
It should be understood that the term "and/or" herein is merely one type of association relationship that describes an associated object, meaning that three relationships may exist, e.g., a and/or B may mean: a exists alone, A and B exist simultaneously, and B exists alone. In addition, the character "/" herein generally indicates that the former and latter associated objects are in an "or" relationship.
It should be understood that, in the various embodiments of the present application, the sequence numbers of the above-mentioned processes do not mean the execution sequence, and the execution sequence of each process should be determined by its function and inherent logic, and should not constitute any limitation to the implementation process of the embodiments of the present application.
Those of ordinary skill in the art will appreciate that the various illustrative elements and algorithm steps described in connection with the embodiments disclosed herein may be implemented as electronic hardware or combinations of computer software and electronic hardware. Whether such functionality is implemented as hardware or software depends upon the particular application and design constraints imposed on the implementation. Skilled artisans may implement the described functionality in varying ways for each particular application, but such implementation decisions should not be interpreted as causing a departure from the scope of the present application. It is clear to those skilled in the art that, for convenience and brevity of description, the specific working processes of the above-described systems, apparatuses and units may refer to the corresponding processes in the foregoing method embodiments, and are not described herein again. In the several embodiments provided in the present application, it should be understood that the disclosed system, apparatus and method may be implemented in other ways. For example, the above-described apparatus embodiments are merely illustrative, and for example, the division of the units is only one type of logical functional division, and other divisions may be realized in practice, for example, multiple units or components may be combined or integrated into another system, or some features may be omitted, or not executed. In addition, the shown or discussed mutual coupling or direct coupling or communication connection may be an indirect coupling or communication connection through some interfaces, devices or units, and may be in an electrical, mechanical or other form.
The units described as separate parts may or may not be physically separate, and parts displayed as units may or may not be physical units, may be located in one place, or may be distributed on a plurality of network units. Some or all of the units can be selected according to actual needs to achieve the purpose of the solution of the embodiment. In addition, functional units in the embodiments of the present application may be integrated into one processing unit, or each unit may exist alone physically, or two or more units are integrated into one unit. The functions, if implemented in the form of software functional units and sold or used as a stand-alone product, may be stored in a computer readable storage medium. Based on such understanding, the technical solution of the present application or portions thereof that substantially contribute to the prior art may be embodied in the form of a software product stored in a storage medium and including instructions for causing a computer device (which may be a personal computer, a server, or a network device) to execute all or part of the steps of the method according to the embodiments of the present application. And the aforementioned storage medium includes: various media capable of storing program codes, such as a U disk, a removable hard disk, a ROM, a RAM, a magnetic disk, or an optical disk.
The above description is only for the specific embodiments of the present application, but the scope of the present application is not limited thereto, and any person skilled in the art can easily conceive of the changes or substitutions within the technical scope of the present application, and shall be covered by the scope of the present application. Therefore, the protection scope of the present application shall be subject to the protection scope of the claims.

Claims (27)

1. A method of random access, comprising:
the method comprises the steps that a terminal device generates a random access identifier, and the random access identifier is used for identifying the terminal device in a random access process;
the terminal equipment sends a first request message to an access node, wherein the first request message comprises the random access identifier, and the first request message is used for requesting to access a wireless network in the random access process;
the terminal equipment receives a first response message from the access node, wherein the first response message comprises the random access identifier;
the length of the random access identifier is smaller than that of a temporary mobile user identifier of the terminal equipment, and the length of the temporary mobile user identifier is greater than or equal to 64 bits.
2. The method of claim 1, further comprising:
the terminal equipment sends a Radio Resource Control (RRC) connection establishment completion message to the access node;
the RRC connection setup complete message includes a service temporary mobile subscriber identity of the terminal device, where the service temporary mobile subscriber identity includes the temporary mobile subscriber identity and an identity of the first access management node.
3. The method of claim 1, wherein the terminal device generating the random access identifier comprises:
the terminal equipment generates the random access identification according to the temporary mobile user identification; alternatively, the first and second liquid crystal display panels may be,
the terminal equipment generates the random access identification through a specific algorithm according to a first globally unique temporary user identification, wherein the composition structure of the first globally unique temporary user identification comprises the temporary mobile user identification; alternatively, the first and second electrodes may be,
and the terminal equipment generates a random number as the random access identifier.
4. The method of claim 3, wherein the generating, by the terminal device, the random access identifier according to the temporary mobile subscriber identifier comprises:
generating the random access identification according to the temporary mobile user identification and a specific algorithm; alternatively, the first and second electrodes may be,
and generating the random access identifier according to the identifier of the first access management node, the temporary mobile user identifier and a specific algorithm.
5. The method according to any one of claims 1 to 4, further comprising:
and the terminal equipment sends a registration request message to the access node, wherein the registration request message comprises a first globally unique temporary user identifier, and the first globally unique temporary user identifier is distributed by the first access management node.
6. The method according to any of claims 1 to 5, wherein after the terminal device sends a registration request message to the access node, the method further comprises:
receiving a registration acceptance message from the access node, wherein the registration acceptance message comprises a second globally unique temporary user identifier, and the second globally unique temporary user identifier is distributed by the first access management node or a second access management node;
wherein the second globally unique temporary user identifier is different from the first globally unique temporary user identifier, and the first access management node is different from the second access management node.
7. A method of random access, comprising:
an access node receives a first request message from a terminal device, wherein the first request message is used for requesting to access a wireless network in a random access process, the first request message comprises a random access identifier, and the random access identifier is used for identifying the terminal device in the random access process;
the access node sends a first response message to the terminal equipment, wherein the first response message comprises the random access identification;
the length of the random access identifier is smaller than that of a temporary mobile user identifier of the terminal equipment, and the length of the temporary mobile user identifier is greater than or equal to 64 bits.
8. The method of claim 7, further comprising:
the access node receives a Radio Resource Control (RRC) connection establishment completion message from the terminal equipment, wherein the RRC connection establishment completion message comprises a service temporary mobile user identifier, the service temporary mobile user identifier comprises the temporary mobile user identifier and an identifier of a first access management node, and the service temporary mobile user identifier is distributed by the first access management node;
and the access node selects a second access management node for the terminal equipment according to the service temporary mobile user identification.
9. The method of claim 8, wherein after the access node receives the RRC connection setup complete message from the terminal device, the access node selects a second access management node for the terminal device according to the serving temporary mobile subscriber identity, further comprising:
the access node generates a first identifier according to the service temporary mobile user identifier;
and when the first identifier is the same as the random access identifier, the access node selects a second access management node for the terminal equipment.
10. The method of claim 9, wherein the access node generating the first identity from the serving temporary mobile subscriber identity comprises:
generating the first identifier according to the temporary mobile user identifier and a specific algorithm; alternatively, the first and second electrodes may be,
and generating the first identifier according to the identifier of the first access management node, the temporary mobile user identifier and a specific algorithm.
11. The method according to any one of claims 8 to 10, further comprising:
the access node receives a registration request message from the terminal equipment;
the access node sends the registration request message to the service access management node, wherein the registration request message includes a first globally unique temporary user identifier, and the first globally unique temporary user identifier is allocated to the terminal device by the first access management node.
12. The method of claim 11, further comprising:
the access node receives a registration acceptance message from the second access management node;
the access node sends the registration acceptance message to the terminal equipment;
wherein, the registration acceptance message includes a second globally unique temporary user identifier, and the second globally unique temporary user identifier is allocated to the terminal device by the second access management node;
wherein the second globally unique temporary user identity is different from the first globally unique temporary user identity.
13. An apparatus for random access, comprising:
a processing module, configured to generate a random access identifier, where the random access identifier is used to identify the terminal device in a random access process;
a transceiver module, configured to send a first request message to an access node, where the first request message includes the random access identifier, and the first request message is used to request access to a wireless network in a random access process;
the transceiver module is further configured to receive a first response message from the access node, where the first response message includes the random access identifier;
the length of the random access identification is smaller than that of the temporary mobile user identification, and the length of the temporary mobile user identification is larger than or equal to 64 bits.
14. The apparatus of claim 13, wherein the transceiver module is further configured to:
sending a Radio Resource Control (RRC) connection establishment completion message to the access node;
the RRC connection setup complete message includes a service temporary mobile subscriber identity of the terminal device, where the service temporary mobile subscriber identity includes the temporary mobile subscriber identity and an identity of the first access management node.
15. The apparatus of claim 13, wherein the processing module is specifically configured to:
generating the random access identification according to the temporary mobile user identification; alternatively, the first and second liquid crystal display panels may be,
generating the random access identifier through a specific algorithm according to a first globally unique temporary user identifier, wherein a composition structure of the first globally unique temporary user identifier comprises the temporary mobile user identifier; alternatively, the first and second electrodes may be,
and generating a random number as the random access identification.
16. The apparatus of claim 15, wherein the processing module is further specifically configured to:
generating the random access identification according to the temporary mobile user identification and a specific algorithm; alternatively, the first and second electrodes may be,
and generating the random access identifier according to the identifier of the first access management node, the temporary mobile user identifier and a specific algorithm.
17. The apparatus according to any one of claims 13 to 16, wherein the transceiver module is further configured to:
and sending a registration request message to the access node, wherein the registration request message comprises a first globally unique temporary user identifier, and the first globally unique temporary user identifier is distributed by the first access management node.
18. The apparatus according to any one of claims 13 to 17, wherein the transceiver module is further configured to:
receiving a registration acceptance message from the access node, wherein the registration acceptance message comprises a second globally unique temporary user identifier, and the second globally unique temporary user identifier is distributed by the first access management node or a second access management node;
wherein the second globally unique temporary user identifier is different from the first globally unique temporary user identifier, and the first access management node is different from the second access management node.
19. An apparatus for random access, comprising:
a transceiver module, configured to receive a first request message from a terminal device, where the first request message is used to request access to a wireless network in a random access process, and the first request message includes a random access identifier, where the random access identifier is used to identify the terminal device in the random access process;
the transceiver module is further configured to send a first response message to the terminal device, where the first response message includes the random access identifier,
the length of the random access identifier is smaller than that of a temporary mobile user identifier of the terminal equipment, and the length of the temporary mobile user identifier is greater than or equal to 64 bits.
20. The apparatus of claim 19,
the transceiver module is further configured to receive a radio resource control RRC connection setup complete message from the terminal device, where the RRC connection setup complete message includes a serving temporary mobile subscriber identity, the serving temporary mobile subscriber identity includes the temporary mobile subscriber identity and an identity of a first access management node, and the serving temporary mobile subscriber identity is allocated by the first access management node;
and the processing module is used for selecting a second access management node for the terminal equipment according to the service temporary mobile user identification.
21. The apparatus of claim 19, wherein the processing module is further specifically configured to:
generating a first identifier according to the service temporary mobile user identifier;
and when the first identifier is the same as the random access identifier, the access node selects a second access management node for the terminal equipment.
22. The apparatus according to claim 21, wherein the processing module is further specifically configured to:
generating the first identifier according to the temporary mobile user identifier and a specific algorithm; alternatively, the first and second electrodes may be,
and generating the first identifier according to the identifier of the first access management node, the temporary mobile user identifier and a specific algorithm.
23. The apparatus according to any one of claims 19 to 22, wherein the transceiver module is further configured to:
receiving a registration request message from the terminal equipment;
and sending the registration request message to the second access management node, wherein the registration request message comprises a first globally unique temporary user identifier, and the first globally unique temporary user identifier is allocated to the terminal equipment by the first access management node.
24. The apparatus of claim 23, wherein the transceiver module is further configured to:
receiving a registration acceptance message from the second access management node;
sending the registration acceptance message to the terminal equipment;
wherein, the registration acceptance message includes a second globally unique temporary user identifier, and the second globally unique temporary user identifier is allocated to the terminal device by the second access management node;
wherein the second globally unique temporary user identity is different from the first globally unique temporary user identity.
25. A communications apparatus, comprising:
a processor and a memory;
the memory for storing a computer program;
the processor configured to execute the computer program stored in the memory to cause the communication apparatus to perform the communication method of any one of claims 1 to 6, or to perform the communication method of any one of claims 7 to 12.
26. A computer-readable storage medium, having stored thereon a computer program which, when run on a computer, causes the computer to perform the communication method according to any one of claims 1 to 6, or to perform the communication method according to any one of claims 7 to 12.
27. A chip system, comprising: a processor for calling and running a computer program from a memory so that a communication device in which the system-on-chip is installed performs the communication method according to any one of claims 1 to 6, or performs the communication method according to any one of claims 7 to 12.
CN202011404557.3A 2020-12-04 2020-12-04 Random access method, device and system Pending CN114599112A (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN202011404557.3A CN114599112A (en) 2020-12-04 2020-12-04 Random access method, device and system
PCT/CN2021/130862 WO2022116809A1 (en) 2020-12-04 2021-11-16 Random access method, apparatus and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202011404557.3A CN114599112A (en) 2020-12-04 2020-12-04 Random access method, device and system

Publications (1)

Publication Number Publication Date
CN114599112A true CN114599112A (en) 2022-06-07

Family

ID=81812216

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202011404557.3A Pending CN114599112A (en) 2020-12-04 2020-12-04 Random access method, device and system

Country Status (2)

Country Link
CN (1) CN114599112A (en)
WO (1) WO2022116809A1 (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2024022032A1 (en) * 2022-07-29 2024-02-01 华为技术有限公司 Communication method and apparatus

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20170332417A1 (en) * 2016-05-16 2017-11-16 Futurewei Technologies, Inc. Random Access Procedure and Burst Transmission in a High Frequency System
US11659563B2 (en) * 2017-01-04 2023-05-23 Huawei Technologies Co., Ltd. System and method for user equipment identifier configuration
WO2018129394A1 (en) * 2017-01-06 2018-07-12 Intel IP Corporation Establishment of random access channel communications
US10531494B2 (en) * 2017-01-17 2020-01-07 Huawei Technologies Co., Ltd. Reference signal scrambling for random access

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2024022032A1 (en) * 2022-07-29 2024-02-01 华为技术有限公司 Communication method and apparatus

Also Published As

Publication number Publication date
WO2022116809A1 (en) 2022-06-09

Similar Documents

Publication Publication Date Title
CN108353351B (en) Method for selecting service network, network equipment and management equipment
CN108632808B (en) Core network control plane device selection method and device
CN109845360B (en) Communication method and device
JP2014532342A (en) Method of issuing content and user equipment
WO2017125025A1 (en) Call method, device, system, and storage medium
CN109196919B (en) Radio resource control procedure for queries of service providers
CN113038628A (en) Relay parameter configuration method, terminal equipment and network side equipment
KR20130093953A (en) Method and apparatus for supporting device to device communications
CN109788507B (en) Communication method and device
CN111405637B (en) Communication method and device
JP2019504518A (en) Connection establishment method and apparatus
CN113543135A (en) Authorization method, policy control function device and access and mobility management function device
CN114528540A (en) Service authorization method, communication device and system
CN112637785A (en) Method and apparatus for multicast transmission
US20240080340A1 (en) Security for Groupcast Message in D2D Communication
US20210219141A1 (en) Systems and methods for radio resource control management in a shared network
CN114599112A (en) Random access method, device and system
CN113660680A (en) Configuration method and equipment in sidelink relay architecture
US11678387B2 (en) Network selection with stateless network functions
EP4319410A1 (en) Method for detecting pscch, and communication apparatus
KR102256582B1 (en) Method for obtaining context configuration information, terminal equipment and access network equipment
CN113068172B (en) Method for triggering discovery, terminal equipment and network equipment
CN114365523B (en) Remote signing method, terminal, device and storage medium of NPN (negative-positive-negative) network
WO2021098073A1 (en) Registration with accessibility and mobility management function re-allocation
CN117156610A (en) Transmission control method for heterogeneous fusion of space network and ground multi-hop network

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination