CN115039390A - Communication control method, device, equipment and storage medium - Google Patents

Communication control method, device, equipment and storage medium Download PDF

Info

Publication number
CN115039390A
CN115039390A CN202080095376.9A CN202080095376A CN115039390A CN 115039390 A CN115039390 A CN 115039390A CN 202080095376 A CN202080095376 A CN 202080095376A CN 115039390 A CN115039390 A CN 115039390A
Authority
CN
China
Prior art keywords
information
session
area
allowed
region
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202080095376.9A
Other languages
Chinese (zh)
Other versions
CN115039390B (en
Inventor
许阳
陈振豪
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guangdong Oppo Mobile Telecommunications Corp Ltd
Original Assignee
Guangdong Oppo Mobile Telecommunications Corp Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guangdong Oppo Mobile Telecommunications Corp Ltd filed Critical Guangdong Oppo Mobile Telecommunications Corp Ltd
Publication of CN115039390A publication Critical patent/CN115039390A/en
Application granted granted Critical
Publication of CN115039390B publication Critical patent/CN115039390B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G05CONTROLLING; REGULATING
    • G05DSYSTEMS FOR CONTROLLING OR REGULATING NON-ELECTRIC VARIABLES
    • G05D1/00Control of position, course or altitude of land, water, air, or space vehicles, e.g. automatic pilot
    • G05D1/02Control of position or course in two dimensions

Abstract

An embodiment of the application provides a communication control method, a communication control device, communication control equipment and a storage medium, wherein the method comprises the following steps: performing restricted data communication in the first area, the restricted data communication including allowing the terminal device to use a portion of the established session for data transfer in the first area; and/or allowing the terminal device to establish a specific session for data transmission in the first area. According to the technical scheme of the embodiment of the application, the terminal equipment in the first area can be conveniently controlled, and the terminal equipment is prevented from losing control in the first area.

Description

Communication control method, device, equipment and storage medium Technical Field
The present disclosure relates to the field of communications technologies, and in particular, to a communication control method, apparatus, device, and storage medium.
Background
With the development of mobile communication technology, various terminal devices can access a mobile communication network. For some types of terminal devices, such as drones, autonomous vehicles, etc., it may be desirable to define certain areas to prohibit access, and the areas in which access is prohibited may be referred to as restricted areas.
Use unmanned aerial vehicle as an example, at unmanned aerial vehicle's flight in-process, can set up the restricted area through geofence, unmanned aerial vehicle need know the scope in restricted area to avoid flying in the restricted area. Once a drone flies into a restricted area, it may be necessary to control the drone to fly out of the restricted area, or to notify an authoritative Third Party Entity (TPAE), such as a drone controller belonging to a public safety system, to take over control or monitoring of the drone.
However, in the current technical solution, when a terminal device, such as an unmanned aerial vehicle, moves to a restricted area, all session connections are disconnected, which makes it difficult to control the terminal device in the restricted area.
Disclosure of Invention
Embodiments of the present application provide a communication control method, an apparatus, a device, and a storage medium, which are used to solve the problem that, in the current technical solution, when a terminal device moves to a restricted area, it is difficult to control the terminal device in the restricted area because all session connections are disconnected.
In a first aspect, an embodiment of the present application provides a communication control method, which is applied to an electronic device, and the method includes:
conducting restricted data communication in a first area, the restricted data communication including permitting data transfer by the electronic device using a portion of the established session in the first area; and/or allowing the electronic device to establish a specific session for data transmission in the first area.
In a second aspect, an embodiment of the present application provides a communication control method, which is applied to a network device, and the method includes:
performing restricted data communication in a first area, the restricted data communication including allowing terminal devices within the first area to use a portion of the established session for data transfer; and/or allowing the terminal device to establish a specific session for data transmission.
In a third aspect, an embodiment of the present application provides a communication control apparatus, which is applied to an electronic device, and the apparatus includes:
a restrictive communication module for restrictive data communication in a first area, the restrictive data communication including permitting the electronic device to use a portion of the established session for data transfer in the first area; and/or allowing the electronic device to establish a specific session for data transmission in the first area.
In a fourth aspect, an embodiment of the present application provides a communication control apparatus, which is applied to a network device, and the apparatus includes:
a restrictive communication module for restrictive data communication in a first area, the restrictive data communication including allowing terminal devices within the first area to use a portion of the established session for data transmission; and/or allowing the terminal device to establish a specific session for data transmission.
In a fifth aspect, an embodiment of the present application provides an electronic device, including:
a processor, a memory, a receiver, and an interface for communicating with a network device or a terminal device;
the memory stores computer-executable instructions;
the processor executes the computer-executable instructions stored in the memory, so that the processor executes the communication control method provided by any one of the first aspect.
In a sixth aspect, an embodiment of the present application provides a network device, including:
a processor, a memory, a transmitter, and an interface for communicating with a terminal device;
the memory stores computer-executable instructions;
the processor executes computer-executable instructions stored by the memory, so that the processor executes the communication control method provided by any one of the second surfaces.
Alternatively, the processor may be a chip.
In a seventh aspect, an embodiment of the present application provides a computer-readable storage medium, where computer-executable instructions are stored in the computer-readable storage medium, and when the computer-executable instructions are executed by a processor, the computer-readable storage medium is configured to implement the communication control method provided in any one of the first aspect.
In an eighth aspect, embodiments of the present application may provide a computer-readable storage medium, where computer-executable instructions are stored, and when the computer-executable instructions are executed by a processor, the computer-readable storage medium is configured to implement the communication control method provided in any one of the second aspects.
In a ninth aspect, an embodiment of the present application provides a program, which when executed by a processor, is configured to perform the communication control method according to any one of the first aspect.
In a tenth aspect, an embodiment of the present application provides a program, which when executed by a processor, is configured to perform the communication control method according to any one of the second aspects.
In an eleventh aspect, an embodiment of the present application provides a computer program product, which includes program instructions for implementing the communication control method as provided in any one of the first aspect.
In a twelfth aspect, an embodiment of the present application provides a computer program product, which includes program instructions for implementing the communication control method as provided in any one of the second aspects.
In a thirteenth aspect, an embodiment of the present application provides a chip, including: a processing module capable of executing the communication control method provided in any one of the first aspect, and a communication interface.
Further, the chip further includes a storage module (e.g., a memory) for storing instructions, the processing module is configured to execute the instructions stored by the storage module, and execution of the instructions stored in the storage module causes the processing module to execute the communication control method provided in any one of the first aspect.
In a fourteenth aspect, an embodiment of the present application provides a chip, including: a processing module capable of executing the communication control method provided in any one of the second aspect, and a communication interface.
Further, the chip further includes a storage module (e.g., a memory) for storing instructions, the processing module is for executing the instructions stored by the storage module, and the execution of the instructions stored in the storage module causes the processing module to execute the communication control method provided by any one of the second aspect.
According to the communication control method, the communication control device, the communication control equipment and the storage medium, restrictive data communication is introduced into the first area, namely, only part of established sessions are allowed to be used by the electronic equipment in the first area for data transmission, or a specific session is allowed to be established by the electronic equipment for data transmission, so that the electronic equipment can maintain or newly establish a specific communication connection on the first area for data communication, the electronic equipment in the first area can be conveniently controlled, and the electronic equipment is prevented from losing control in the first area.
Drawings
In order to more clearly illustrate the embodiments of the present application or the technical solutions in the prior art, the drawings needed to be used in the description of the embodiments or the prior art will be briefly introduced below, and it is obvious that the drawings in the following description are some embodiments of the present application, and for those skilled in the art, other drawings can be obtained according to these drawings without inventive exercise.
Fig. 1 is a schematic diagram of an application scenario of a communication control method in a technical solution.
Fig. 2 is a schematic diagram of a communication system applied in the embodiment of the present application.
Fig. 3 is a schematic diagram of a communication system architecture applied in the embodiment of the present application.
Fig. 4 is a flowchart illustrating a first embodiment of a communication control method according to an embodiment of the present application.
Fig. 5 is a flowchart illustrating a second communication control method according to an embodiment of the present application.
Fig. 6 is a flowchart illustrating a third embodiment of a communication control method according to the present application.
Fig. 7 is a flowchart illustrating a fourth embodiment of a communication control method according to the present application.
Fig. 8 is a schematic flowchart of a fifth embodiment of a communication control method according to an embodiment of the present application.
Fig. 9 is a schematic block diagram of a first embodiment of a communication control apparatus according to an embodiment of the present application.
Fig. 10 is a schematic block diagram of a second embodiment of a communication control apparatus according to an embodiment of the present application.
Fig. 11 is a schematic block diagram of a third embodiment of a communication control apparatus according to an embodiment of the present application.
Fig. 12 is a schematic structural diagram of a first electronic device according to an embodiment of the present application.
Fig. 13 is a schematic structural diagram of a first network device according to an embodiment of the present application.
Detailed Description
The terms "first," "second," and the like in the description and in the claims, and in the foregoing drawings, are used for distinguishing between similar elements and not necessarily for describing a particular sequential or chronological order. It is to be understood that the data so used may be interchanged under appropriate circumstances such that the embodiments of the application described herein may be implemented, for example, in sequences other than those illustrated or described herein. Furthermore, the terms "comprises," "comprising," and "having," and any variations thereof, are intended to cover a non-exclusive inclusion, such that a process, method, system, article, or apparatus that comprises a list of steps or elements is not necessarily limited to those steps or elements expressly listed, but may include other steps or elements not expressly listed or inherent to such process, method, article, or apparatus.
It should be understood that the terms "system" and "network" are often used interchangeably herein. The term "and/or" herein is merely an association relationship describing an associated object, and means that there may be three relationships, for example, a and/or B, which may mean: a exists alone, A and B exist simultaneously, and B exists alone. In addition, the character "/" herein generally indicates that the former and latter associated objects are in an "or" relationship.
First, some terms in the embodiments of the present application are explained so that those skilled in the art can understand that:
authorized area: in some scenarios, the movement of the terminal device needs to be limited within a certain range, and this limited range may be referred to as an authorized region, and a region outside the authorized region may be referred to as an unauthorized region or a restricted region.
UE: user Equipment (UE), also referred to as terminal equipment or terminal in embodiments of the present application, may include various handheld devices with wireless communication functions, vehicle-mounted devices, drones, wearable devices, computing devices, or other processing devices connected to a wireless modem, such as a smart phone, an internet of things chip, a smart driving vehicle, and the like.
(R) AN: the (radio) access network (R) AN) has as a main function to control the UE to access into the mobile communication network via radio. Taking the mobile phone internet access as AN example, the (R) AN node may be a base station.
UPF: the main functions of the User Plane Function (UPF) include user plane related functions such as packet routing and transmission, packet detection, service amount reporting, quality of service (QoS) processing, lawful interception, uplink packet detection, and downlink packet storage.
DN: data networks (data networks).
AMF: the main functions of the access and mobility management function (AMF) include access and mobility related functions such as connection management, mobility management, registration management, access authentication and authorization, reachability management, security context management, etc.
SMF: the main functions of the Session Management Function (SMF) include session management (such as session establishment, modification, and release, including tunnel maintenance between the UPF network element and the AN), selection and control of the UPF network element, Service and Session Continuity (SSC) mode selection, roaming, and other session-related functions.
PCF: the main functions of a Policy Control Function (PCF) include policy-related functions such as unified policy formulation, provision of policy control, and acquisition of subscription information related to policy decision from a Unified Database (UDR).
AF: an Application Function (AF) interacts with a 3GPP core network to provide a service or service.
NSSF: the main functions of a Network Slice Selection Function (NSSF) include selecting a set of Network Slice instances for a UE, determining allowed Network Slice Selection service Information (NSSAI), determining an AMF set that can serve the UE, and the like.
UDM: the unified data management network element (UDM) supports authentication credential processing, user identity processing, access authorization, registration and mobility management, subscription management, short message management, and the like in a 3GPP authentication and key negotiation mechanism.
AUSF: an authentication server function network element (AUSF) interacts with the UDM to acquire user information and perform authentication related functions, such as generating an intermediate key.
NEF: the main functions of a network open function (NEF) include: the services and capabilities provided by the safe open 3GPP network function are internally open or open to third parties, etc. Converting or translating Information interacted with the AF and internal Network function interaction Information, such as AF service identification and internal 5G core Network Information, such as Data Network Name (DNN), Single-Network Slice Selection service Information (S-NSSAI) and the like;
in the following, the technical solutions in the embodiments of the present application will be clearly and completely described with reference to the drawings in the embodiments of the present application, and it is obvious that the described embodiments are some, but not all embodiments of the present application. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present application.
Fig. 1 is a schematic diagram of an application scenario of a communication control method in a technical solution.
Referring to fig. 1, the movement of a terminal device 110, such as a drone or an autonomous vehicle, may need to be limited to a certain range, which may be referred to as an authorized area, and an area outside the authorized area may be referred to as an unauthorized area or a restricted area. As shown in fig. 1, a PDU session-1 is established between the terminal device 110 and the management server 120, the management server 120 may be a remote server of a private agency, and the terminal device 110 is controlled by the management server 120. When the terminal device 110 moves to an unauthorized area, data transmission with the management and control server 120 still needs to be maintained, so that on one hand, the management and control server 120 can continue to control the terminal device 110 to fly or drive; on the other hand, it is enabled to transfer the control right of the terminal device 110 to a node in the jurisdiction of the unauthorized area, for example, when the terminal device 110 moves to the unauthorized area, it is necessary that the management server 120 may continue to control the terminal device 110 to fly or drive, or may move the control right to a node in the jurisdiction of the unauthorized area, for example, the management server 130.
Therefore, it is required that the terminal device 110 maintains a specific communication connection (e.g., PDU session-1) while in the unlicensed region, or establishes a specific communication connection in the unlicensed region to communicate with the regulation server 130 of the unlicensed region, for example, to establish a PDU session-2 with the regulation server 130. PDU session-1 may be released after the regulation server 130 has completely taken over the terminal device 110 (but not immediately after the terminal device 110 has moved into the unlicensed region), e.g., after PDU session-1 is released after the PDU session-2 established between the terminal device 110 and the regulation server 130 is successful.
In the current technical solution, when the terminal device 110, such as the drone, moves to an unauthorized area, all session connections are broken, which makes it difficult to control the terminal device in the unauthorized area.
Based on the above, the embodiments of the present application provide a communication control method, where restricted data communication is performed in a first area, where the restricted data communication includes allowing a terminal device to perform data transmission using a part of an established session; and/or allow the terminal device to establish a specific session for data transfer. According to the technical scheme of the embodiment of the application, by introducing restrictive data communication on the first area, that is, allowing the terminal device to use part of the established session for data transmission in the first area, or allowing the terminal device to establish a specific session for data transmission, the terminal device can maintain or newly establish a specific communication connection on the first area for data communication, so that the terminal device in the first area can be conveniently controlled, and the terminal device is prevented from losing control in the first area.
The technical scheme of the embodiment of the application can be applied to various communication systems, for example: a Global System for Mobile communications (GSM) System, a Code Division Multiple Access (CDMA) System, a Wideband Code Division Multiple Access (WCDMA) System, a General Packet Radio Service (GPRS), a Long Term Evolution (Long Term Evolution, LTE) System, a LTE Frequency Division Duplex (FDD) System, a LTE Time Division Duplex (TDD) System, an LTE-Advanced Long Term Evolution (LTE-A) System, a New Radio (NR) System, an Evolution System of an NR System, a LTE-based Universal Access to unlicensed (NR) System, a non-NR System, a communication System of an NR System, a communication System of a non-licensed band (NR System, a CDMA) System, UMTS), Worldwide Interoperability for Microwave Access (WiMAX) communication system, Wireless Local Area Network (WLAN), Wireless Fidelity (WiFi), NTN communication system, next generation communication system, or other communication system.
Generally, the conventional Communication system supports a limited number of connections and is easy to implement, however, with the development of Communication technology, the mobile Communication system will support not only conventional Communication but also, for example, Device to Device (D2D) Communication, Machine to Machine (M2M) Communication, Machine Type Communication (MTC), and Vehicle to Vehicle (V2V) Communication, Device to satellite Communication, etc., and the technical solution of the embodiments of the present application can also be applied to these Communication systems.
Fig. 2 is a schematic diagram of a communication system applied in the embodiment of the present application, and as shown in fig. 2, the communication system 200 may include a terminal device 210 and a network device 220. Terminal devices 210 include, but are not limited to, devices that communicate via wireline, such as devices that communicate via Public Switched Telephone Network (PSTN), Digital Subscriber Line (DSL), Digital cable, direct cable connection; and/or devices that communicate via a Wireless interface, e.g., for a cellular Network, a Wireless Local Area Network (WLAN), a digital television Network such as a DVB-H Network, a satellite Network, an AM-FM broadcast transmitter; and/or means of another terminal device arranged to receive/transmit communication signals; and/or Internet of Things (IoT) devices. A terminal device arranged to communicate over a wireless interface may be referred to as a "wireless communication terminal", "wireless terminal", or "mobile terminal". Examples of mobile terminals include, but are not limited to, satellite or cellular telephones; personal Communications Systems (PCS) terminals that may combine cellular radiotelephones with data processing, facsimile, and data Communications capabilities; personal Digital Assistant (PDA) that may include a radiotelephone, pager, internet/intranet access, Web browser, notepad, calendar, and/or Global Positioning System (GPS) receiver; and conventional laptop and/or palmtop receivers or other electronic devices that include a radiotelephone transceiver. Terminal Equipment may refer to an access terminal, User Equipment (UE), subscriber unit, subscriber station, mobile station, remote terminal, mobile device, User terminal, wireless communication device, User agent, or User Equipment. An access terminal may be a cellular telephone, a cordless telephone, a Session Initiation Protocol (SIP) phone, a Wireless Local Loop (WLL) station, a PDA, a handheld device with Wireless communication capabilities, a computing device or other processing device connected to a Wireless modem, a vehicle mounted device, a wearable device, a terminal device in a 5G network or a terminal device in a PLMN for future evolution, etc.
The network device 220 may provide communication coverage for a particular geographic area and may communicate with terminal devices 210 located within that coverage area. Alternatively, the Network device 220 may be a Base Transceiver Station (BTS) in a GSM system or a CDMA system, a Base Station (NodeB, NB) in a WCDMA system, an evolved Node B (eNB or eNodeB) in an LTE system, a wireless controller in a Cloud Radio Access Network (CRAN), a satellite in a Non-Terrestrial communication Network (NTN), or a Network device in a Mobile switching center, a relay Station, an Access point, a vehicle-mounted device, a wearable device, a hub, a switch, a bridge, a router, a Network device in a 5G Network, or a Network device in a Public Land Mobile Network (PLMN) for future evolution, and the like.
Optionally, terminal-to-Device (D2D) communication may be performed between the terminal devices 210, that is, the technical solution provided in this application may also be applied to communication between two terminal devices.
Alternatively, the 5G system or the 5G network may also be referred to as a New Radio (NR) system or an NR network.
Fig. 2 exemplarily shows one network device and two terminal devices, and optionally, the communication system 200 may include a plurality of network devices and may include other numbers of terminal devices within the coverage of each network device, which is not limited in this embodiment of the present application.
Optionally, the communication system 200 may further include other network entities such as a network controller, a mobility management entity, and the like, which is not limited in this embodiment.
Fig. 3 is a schematic diagram of a communication system architecture applied in the embodiment of the present application.
Referring to fig. 3, a UE, i.e., a terminal device, performs AN access layer connection with AN through a Uu port, interacts AN access layer message with the AN and performs wireless data transmission, and the AN performs data transmission with AN AMF through AN N2 interface. The UE performs Non Access Stratum (NAS) connection with the AMF through an N1 port, and exchanges NAS messages between the UE and the AMF. The AMF is in communication connection with a UDM through an N8 interface, and the UDM is a subscription database in a core network and stores subscription data of users in a 5G network. The AMF is a mobility management function in the core network, the AMF is in communication connection with the SMF through an N11 interface, the SMF is a session management function in the core network, and the AMF is responsible for forwarding session management related messages between the UE and the SMF besides performing mobility management on the UE. In addition, the AMF is communicatively connected to the AUSF and the NSSF via an N12 interface and an N22 interface, respectively. SMF is connected with PCF through N7 interface, PCF is strategy management function in core network, responsible for making the strategy related to UE mobility management, conversation management, charging, etc, PCF is connected with AF communication through N5 interface. The UPF is a user plane function in the core network, and performs data transmission with the external data network DN through AN N6 interface, with the AN through AN N3 interface, and with the SFM through AN N4 interface. After the UE accesses the 5G network through the Uu port, the PDU session data connection from the UE to the UPF is established under the control of the SMF, and therefore data transmission is carried out. The system also has an NEF function for interfacing with a third party application server and transferring information between the core network node and the third party application.
The communication control method provided in the present application is explained in detail by several specific embodiments.
Fig. 4 is a flowchart illustrating a first embodiment of a communication control method according to an embodiment of the present application. The communication control method may be applied to an electronic device, and includes step S410.
In step S410, the electronic device performs restricted data communication in the first area, the restricted data communication including allowing the electronic device to perform data transmission using part of the established session; and/or allow the electronic device to establish a particular session for data transfer.
In an example embodiment, the first area is a restricted area, and the electronic device performs restricted data communication in the first area, where the restricted data communication means that the data communication of the electronic device in the first area is restricted, for example, only the electronic device is allowed to perform data transmission with the server 1 using part of the established session, for example, session-1; and/or only allow the electronic device to establish a particular session with the server 2, e.g., session 2, for data transfer. Taking the drone as an example, after the drone flies into the first area, i.e., the restricted area, the drone is only allowed to use the established session with the drone Management center (UTM), and/or the electronic device is only allowed to establish a session with the authoritative third-party entity TPAE for data transmission.
It should be noted that, in an example embodiment, "specific" may mean determined according to a type of the electronic device, for example, the specific session may be a session determined for the type of the electronic device in the first area, for example, a session for communication between the drone and a drone control server of a public security system, a session for communication between the autonomous vehicle and a vehicle control server of a traffic management system, or other suitable forms of sessions, which is not particularly limited in this application.
The electronic device may determine the specific session according to the specific session related information or local configuration sent by the network device side. For example, the network device side may set different specific sessions for different electronic device types in the first area, and send information related to the specific sessions to the electronic device according to the types of the electronic devices. The electronic device may also configure a specific session corresponding to the type of the electronic device locally, and determine the specific session to be established according to the local configuration after moving to the first area.
Further, in an example embodiment, the electronic device performs data communication normally in the second area, where the second area is another area outside the restricted area, and the performing data communication normally may be performing establishment and modification of a PDU session according to a procedure specified by 3GPP, and transmitting user plane data. The partially established session is a session established in the second area.
It should be noted that the electronic device may be a terminal device such as a mobile phone, an unmanned aerial vehicle, or an autonomous vehicle, and may also be other suitable electronic devices such as a base station, which is also within the protection scope of the present application.
According to the technical solution in the example embodiment of fig. 4, by introducing restrictive data communication on the first area, that is, only allowing the electronic device to use a part of the established session for data transmission in the first area, or allowing the electronic device to establish a specific session for data transmission, the electronic device can maintain or newly establish a specific communication connection on the first area for data communication, so that the electronic device in the first area can be conveniently controlled, and the electronic device is prevented from losing control in the first area.
In an example embodiment, the second zone is an authorized zone and the first zone is an unauthorized zone. In the authorization area, the electronic device may normally establish and use multiple connections (e.g. multiple PDU sessions) of the user plane for data communication, and the establishment and use of the connections may be the same as the existing 3GPP mechanism; the electronic device allows use of only a portion of the established PDU session in the unlicensed region. Part of the established PDU session may be used for communication of a specific server; and/or the electronic device moves to an unauthorized area, allowing a particular PDU session to be established. A particular PDU session may be used for communication for a particular server.
It should be noted that, in an example embodiment, the specific server may be a server determined according to the type of the electronic device, for example, for the drone, the specific server may be a server of the UTM; for autonomous vehicles, the specific server may be a vehicle control server of a traffic management system.
Further, after the electronic device moves from the second area to the first area, the maintained communication connection, e.g., session-1, may be released later, e.g., after session-2 is established between the electronic device and the server 2, or the server 2 takes over control of the electronic device and then releases the maintained communication connection, i.e., session-1.
In addition, in some embodiments, the electronic device may also be a base station, and the terminal device may access the new base station by means of handover, or the terminal device may access the new base station by means of cell reselection, cell selection, or redirection. When the terminal device is accessed to the new base station from the original base station, i.e. the electronic device, the new base station can acquire the second information and/or the fourth information from the electronic device; or the new base station may obtain the second information and/or the fourth information from the terminal device.
Wherein the second information comprises at least one of the following information: whether to open restrictive data communication for the electronic device; authorized area and/or unauthorized area information. It should be noted that, in the exemplary embodiment of the present application, the content format of the second information is not limited, but the second information may indicate at least one of the above information.
The fourth information includes at least one of: the session is allowed or required to be released or deactivated in an unauthorized area; which QoS data flow or flows in the session are allowed or need to be released or deactivated in the unlicensed region; the session is allowed or needs to be reserved in an unauthorized area; which QoS data flow or flows in the session are allowed or need to be reserved in the unlicensed region. "reserved" may mean that the session or at least one QoS data flow in the session is allowed or required not to be released or activated in an unlicensed region, and data communication may also be performed normally as in an unlicensed region.
It should be noted that, in the exemplary embodiment of the present application, the content form of the fourth information is not limited, but the fourth information may indicate at least one of the above information, and the fourth information may further carry specific session identification information and/or identification information of a QoS data flow.
Fig. 5 is a flowchart illustrating a second communication control method according to an embodiment of the present application.
Referring to fig. 5, in step S510, the terminal device normally performs data communication in the authorized area.
In an example embodiment, the normal data communication may be to perform the establishment, modification and transmission of user plane data of a PDU session according to the procedures specified by 3GPP, for example, to normally establish, activate or maintain multiple session connections. Referring to fig. 5, the terminal device establishes a PDU session normally with the regulation server 1 and a plurality of other servers, for example, the PDU session-1 is established normally between the terminal device and the regulation server 1.
In step S520, the terminal device maintains a part of the established connection in the unauthorized area, and/or establishes a specific connection.
In an example embodiment, the terminal device moves from the authorized area to the unauthorized area, maintains a partially established session connection in the unauthorized area, for example, maintains a session connection with the regulation server 1, i.e., PDU session-1, and releases the session connection with other servers.
According to the technical solution in the example embodiment of fig. 5, the session connection that is partially established is maintained, so that an uncontrolled situation caused by a sudden disconnection of the communication connection when the terminal device enters an unauthorized area can be avoided.
Further, the terminal device may also establish a specific connection, for example, establish a session connection with the regulation server 2, i.e. PDU session 2. The specific connection is a connection for more reasonable control of the terminal device in an unauthorized area, for example the specific connection may be a connection for communication between a drone and a drone control server of a public security system, or a connection for communication between an autonomous vehicle and a vehicle control server of a traffic management system.
It should be noted that, after the terminal device moves to the unauthorized area, the maintained communication connection, for example, PDU session-1, may be released later, for example, after PDU session-2 is established between the terminal device and the regulation server 2, or after the regulation server 2 takes over control of the terminal device, the maintained communication connection is released.
On the basis of the above embodiments, the following describes in detail an implementation scheme of a specific application process of the communication control method by using several specific embodiments with reference to the accompanying drawings.
EXAMPLE III
In this embodiment, during the registration process, the terminal device may send first information to the network device through a NAS message (e.g., a registration request), where the first information may be used to indicate at least one of the following information:
-requesting to open a restricted data communication;
-authorized area and/or unauthorized area information. The information of the authorized Area and/or the unauthorized Area may be described by Global Positioning System (GPS) information, cell identification information, Tracking Area Identification (TAI) information, and the like.
A network element of the core network (e.g., such as the AMF) may interact with the UDM and/or the PCF, and the interaction information may include the first information.
Further, the core network element determines second information based on the NAS message and/or the interaction message, and sends the second information to the terminal and/or the access network, for example, the base station, where the second information includes at least one of the following information:
-whether restrictive data communication is opened for the terminal device;
-information of authorized and/or unauthorized areas. Wherein, the information of authorized area and/or unauthorized area can be described by GPS coordinates, cell identification, TAI table, etc.).
Fig. 6 is a flowchart illustrating a third embodiment of a communication control method according to an embodiment of the present application.
Referring to fig. 6, in step S610, the terminal device sends a registration request to the core network during a registration process, where the registration request may include the first information.
In an example embodiment, the first information may be used to indicate at least one of: information requesting to open restrictive data communication; authorized area and/or unauthorized area information. The terminal device may send the registration request to the core network by adding the first information in the registration request, e.g., a NAS message. The information of the authorized Area and/or the unauthorized Area may be described by GPS coordinates, cell identification information, Tracking Area Identification (TAI) information, and the like.
It should be noted that, in the exemplary embodiment of the present application, the content form of the first information is not limited, but the first information may indicate at least one of the above information.
It should be noted that the restrictive data communication means that the data communication of the terminal device in the unauthorized area is restricted, for example, the terminal device is allowed to use part of the established session to perform data transmission with the network device; and/or allow the terminal device to establish a specific session with the network device for data transmission. Taking the drone as an example, after the drone flies into the unauthorized area, the drone is allowed to use the established session with the drone Management center (UTM), and/or the terminal device is allowed to establish the session with the TPAE for data transmission.
In step S620, the core network interacts with the UDM and/or the PCF, and the interaction information may include the first information.
In an example embodiment, a network element of a core network, such as an AMF, interacts with a UDM and/or a PCF, the interaction message includes first information, for example, the interaction message includes subscription information and/or policy information, and the subscription information and/or policy information includes the first information.
It should be noted that, in step S610 and step S620, the first information may be added only in one step, for example, the first information is added only in the registration request in step S610, or the first information is added only in the subscription information and/or the policy information in step S620, or the first information may be added in both steps, where the added first information includes a parameter providing part or all of the first information, and when the contents of the parameter of the first information in both steps conflict, the core network, for example, AMF, determines which step of the first information content is used.
In step S630, the core network sends second information to the access network, and the second information may be determined based on the interworking information in step S620 and/or the registration request in step S610.
In an example embodiment, the second information includes at least one of: whether restrictive data communication is opened for the terminal equipment or not; authorized area and/or unauthorized area information. The core network element AMF sends the second information to the access network RAN via an N2 interface request, where the N2 interface request includes the second information.
It should be noted that, in the exemplary embodiment of the present application, the content form of the second information is not limited, but the second information may indicate at least one of the above information.
In step S640, the core network sends a registration reply to the terminal device, where the registration reply may include the second information.
In an example embodiment, the core network element, e.g. the AMF, sends a registration reply to the terminal device over the N1 interface, the registration reply including the second information.
It should be noted that, in some example embodiments, step 630 and step 640 may be combined into one step, that is, the message that carries the N2 interface in step 630 and is sent to the access network RAN also carries a registration reply, that is, a NAS message, which is sent to the terminal device, and after receiving the message in step 630, the RAN passes the registration reply, that is, the NAS message, through to the terminal device.
Furthermore, in an example embodiment, the terminal device or UDM/PCF may also provide an indication to the core network that "no authorized or unauthorized areas are defined for the terminal device, i.e. no valid area for user plane data connections is defined.
It should be noted that there is no necessary causal relationship between the first information and the second information, that is, the second information may be sent to the base station and/or the terminal even if the core network, such as the AMF, does not receive the first information of the terminal or the UDM/PCF, or the core network, such as the AMF, only receives the first information from the terminal and/or the UDM/PCF, and does not need to send the second information to the base station and/or the terminal.
Example four
In this embodiment, the terminal device may add the third information to a NAS message (such as a session establishment/modification request) during a session establishment/modification process, and/or a core network element (e.g., SMF) obtains the third information from mutual information of the UDM or PCF, where the third information includes at least one of the following information:
-requesting that the session is allowed or needs to be released or deactivated in an "unlicensed area";
-requesting that the session is allowed or needs to be reserved in "unlicensed areas";
-requesting which QoS data flow or flows in the session are allowed or need to be released or deactivated in the "unlicensed region";
-requesting which QoS data flow or flows in the session are allowed or need to be reserved in the "unlicensed region".
"reserved" may mean that the session or at least one QoS data flow in the session is allowed or required not to be released or activated in an unlicensed region, and data communication may also be performed normally as in an unlicensed region.
It should be noted that only one of the NAS message and the interaction information of the UDM/PCF may include the third information, that is, the NAS message includes the third information, or the interaction information of the UDM/PCF includes the third information.
The core network element may add fourth information to the "session establishment request" message sent to the base station and/or the NAS reply message (e.g., session establishment reply) sent to the terminal device, where the fourth information is used to indicate whether the behavior requested in the third information is approved (corresponding to the four pieces of request information in the above third information).
Fig. 7 is a flowchart illustrating a fourth embodiment of a communication control method according to the present application.
Referring to fig. 7, in step S710, the terminal device sends third information to the core network during the session establishment or modification process.
In an example embodiment, third information may be added to the NAS message of the session establishment/modification request, where the third information includes at least one of the following information:
-requesting that the session is allowed or needs to be released or deactivated in an "unlicensed area";
-requesting that the session is allowed or needs to be reserved in "unlicensed areas";
-requesting which QoS data flow or flows in the session are allowed or need to be released or deactivated in the "unlicensed region";
-requesting which QoS data flow or flows in the session are allowed or need to be reserved in the "unlicensed region".
It should be noted that, in the exemplary embodiment of the present application, the content form of the third information is not limited, but the third information may indicate at least one of the above information, and the third information may further carry specific session identification information and/or identification information of a QoS data flow.
In step S720, the core network interacts with the UDM and/or the PCF, and the interaction message may include a third message.
In an example embodiment, a core network element (e.g., SMF) interacts with the UDM and/or PCF, and obtains a third message from the interaction message, where the interaction message includes subscription information and/or policy information, and the subscription information and/or policy information includes the third message.
It should be noted that only one of the NAS message in step S710 and the interworking information in step S720 may include the third information, that is, the NAS message includes the third information, or the interworking information of the UDM/PCF includes the third information. The first information may be added in both steps, including a parameter providing part or all of the first information, and in case the parameter content of the first information in both steps conflicts, the core network, e.g. SMF, decides which step of the first information content to use.
In step S730, the core network may add fourth information in a "session request" message sent to the access network. The fourth information is used for indicating at least one of the following information:
-the session is allowed or needs to be released or deactivated in "unlicensed areas";
-the session is allowed or needs to be reserved in "unlicensed areas";
-which QoS data flow or flows in the session are allowed or need to be released or deactivated in the "unlicensed region";
-which QoS data flow or flows in the session are allowed or need to be reserved in the "unlicensed region".
It should be noted that the fourth information may be obtained based on the third information, or may be generated by the core network element itself, which is not limited in this application.
It should be noted that, in the exemplary embodiment of the present application, the content form of the fourth information is not limited, but the fourth information may indicate at least one of the above information, and the fourth information may further carry specific session identification information and/or identification information of a QoS data flow.
In an example embodiment, the core Network element may determine the content of the fourth Information according to Single-Network Slice Selection service Information (S-NSSAI) and/or DNN corresponding to the PDU session. Adding the determined fourth information to a session setup request to the access network RAN.
In step S740, the core network may add fourth information to the session reply message of the sending terminal device.
In an example embodiment, the core network element, e.g. SMF, adds the fourth message to the NAS message of the session establishment reply message sent to the terminal device.
It should be noted that step S730 and step S740 may be combined into one step, that is, the session establishment request sent to the RAN in step S730 also carries a session establishment reply (such as session accept or reject) sent to the terminal device, and after receiving the message in step S730, the RAN transmits the session establishment reply, that is, the NAS reply message, to the terminal device.
It should be noted that there is no necessary causal relationship between the third information and the fourth information, that is, the fourth information may be sent to the base station and/or the terminal even if the core network, for example, the SMF, does not receive the third information of the terminal or the UDM/PCF, or the core network, for example, the SMF, only receives the third information from the terminal and/or the UDM/PCF, and does not need to send the fourth information to the base station and/or the terminal.
EXAMPLE five
In this example embodiment, the terminal device is outside the "authorized zone", i.e. the unlicensed zone, allowing only specific PDU sessions to be reserved and may also allow specific PDU sessions to be established. The specific PDU session may be a session determined for the type of the terminal device in the unlicensed area, for example, a session between a drone and a drone control server of a public security system, a session between an autonomous vehicle and a vehicle control server of a traffic management system.
In order to establish a specific PDU session, in this exemplary embodiment, fifth information is introduced during the session establishment and/or modification, for example, the fifth information may be added in a NAS message (such as a session establishment/modification request), and/or obtained by a core network element (e.g., SMF) through interaction information of the UDM or PCF, and may include at least one of the following information:
-requesting that the session be established, modified or activated in an unauthorized area;
-which QoS data flow or flows in the session are requested to be established, modified or activated in the unlicensed area.
It should be noted that, in the exemplary embodiment of the present application, the content format of the fifth information is not limited, but the fifth information may indicate at least one of the above information, and the fourth information may further carry specific session identification information and/or identification information of a QoS data flow.
For example, the fifth information may include: requesting that the session be established, modified or activated in the event that the terminal device moves from an authorized area to an unauthorized area; and/or which QoS data flow or flows in the session are requested to be established, modified or activated in case the terminal device moves from an authorized area to an unauthorized area;
the fifth information is used to indicate that the session is established, modified or activated in an unauthorized area. The fifth information may include NAS information (PDU session establishment/modification request) sent by the terminal device, or the core network element may obtain the interaction information from the UDM or the PCF, which is similar to step S710 and step S720, and is not described herein again.
Further, the core network element (e.g. SMF) may determine whether to allow the corresponding PDU session establishment, modification or activation according to the fifth information. For example, the core network element may determine to establish, modify or activate the corresponding session in the unlicensed region according to the fifth information.
In addition, in some example embodiments, the terminal device may carry the third information or the fifth information in the session establishment/modification request message, and further, the terminal device may obtain sixth information from the network device side, where the sixth information includes at least one of the following information:
(1) which PDU session(s) or QoS data flow(s) are allowed or needed to remain in the "unlicensed region";
(2) which PDU sessions or QoS data flows are allowed or need to be released or deactivated in the "unlicensed region";
(3) which PDU sessions or QoS data flows need to be established, modified or activated in the "unlicensed region";
(4) which PDU sessions or QoS data flows are allowed to be established, modified or activated in the "unlicensed region".
It should be noted that, in the exemplary embodiment of the present application, the content form of the sixth information is not limited, but the sixth information may indicate at least one of the above information, and the sixth information may further carry specific session identification information and/or identification information of a QoS data flow.
For example, the sixth information may include: which PDU sessions or QoS data flows must be established, modified or activated in case of movement from "authorized area" to "unauthorized area"; and/or which PDU sessions or QoS data flows are allowed to be established, modified or activated in case of movement from "authorized area" to "unlicensed area";
further, in an exemplary embodiment, when the terminal device is in the "authorized area", it may determine whether the "third information" or the "fifth information" needs to be added to the NAS message sent to the network device according to the content of the "sixth information". The NAS message may be a registration request message or a session establishment request message.
In addition, when the terminal is in the "unlicensed region", it may determine whether to establish, modify, or activate a corresponding PDU session according to the contents of items (3) and (4) of the above-mentioned "sixth information".
It should be noted that the PDU session may be described by PDU session attribute parameters such as S-NSSAI, DNN, PDU session type, SSC-Mode, etc.), as shown in the following path Selection Descriptor (Route Selection Descriptor) table 2.
In some example embodiments, the sixth information may be sent to the terminal device through a NAS message, where the NAS message may be a "registration reply," a "terminal Configuration Update Request (UE Configuration Update Request," or the like message.
In other embodiments, the sixth information may be implemented by extending a terminal Route Selection Policy (URSP) rule of the terminal device, that is, adding "sixth information" to the Policy rule of the URSP, as shown in table 1 below:
table 1 UE path selection policy rules
Parameter name Description of the invention
Rule priority Determining viewing order of URSP rules
Data stream descriptor Characterizing data streams
Application descriptor Including application identification recognizable by terminal operating system and uniquely referring to certain application
IP descriptor IP triplet or IPv6 prefix, port number, protocol identification, etc
non-IP descriptors Characterizing non-IP packets
DNN DNN is provided by an application layer
Capacity of connection Requesting data to be run on a connection supporting said capability
Path selection descriptor The details of the path selection descriptor list are shown in Table 2
Table 2 routing descriptor
Parameter name Description of the invention
Path selection descriptor priority Determining an order of using routing descriptors
Route selectionSelecting parameters Defining path selection parameters
Business and continuity mode selection Containing a value
Network slice selection Containing one or more values
DNN selection Comprising one or more DNN
PDU session type selection Containing a type value
Non-seamless diversion indication Indicating whether a particular traffic needs to be offloaded to a non-3 GPP access
Access type selection Running on PDU sessions corresponding to 3GPP or non-3 GPP access only for data traffic
Sixth information
Fig. 8 is a schematic flowchart of a fifth embodiment of a communication control method according to an embodiment of the present application.
In some example embodiments of the present application, there is provided a communication control method applied to a network device, the method including:
step S810, performing restrictive data communication in a first area, wherein the restrictive data communication comprises allowing terminal equipment in the first area to use part of the established session for data transmission; and/or allowing the terminal device to establish a specific session for data transmission.
According to the technical solution in the example embodiment of fig. 8, by introducing restrictive data communication on the first area, that is, only allowing the terminal device to use a part of the established session for data transmission in the first area, or allowing the terminal device to establish a specific session for data transmission, the terminal device can maintain or newly establish a specific communication connection on the first area for data communication, so that the terminal device in the first area can be conveniently controlled, and the terminal device is prevented from losing control in the first area.
In some example embodiments of the present application, the method further comprises: data communication is normally performed in the second area.
In some example embodiments of the present application, the second area is an authorized area, and the first area is an unauthorized area.
In some example embodiments of the present application, the partially established session is for communication with a particular server, and the particular session is for communication with the particular server.
In some example embodiments of the present application, the method further comprises: receiving first information sent by the terminal device or another network device, wherein the first information includes at least one of the following information: requesting to open the restrictive data communication; information of the authorized area and/or the unauthorized area.
In some example embodiments of the present application, the method further comprises: sending second information to the terminal device, wherein the second information comprises at least one of the following information: whether to open the restrictive data communication for the terminal device; information of the authorized area and/or the unauthorized area.
In some example embodiments of the present application, the method further comprises: receiving third information sent by the terminal device or another network device in a session establishment and/or modification process, wherein the third information includes at least one of the following information: requesting that the session be allowed or required to be released or deactivated in the unlicensed region; requesting at least one QoS data flow in the session, allowed or required to be released or deactivated in the unlicensed region; requesting that the session be allowed or need to be reserved in the unauthorized area; requesting at least one QoS data flow in the session, a reservation being allowed or required in the unlicensed region.
In some example embodiments of the present application, the method further comprises: sending fourth information to the terminal device, wherein the fourth information includes at least one of the following information: the session is allowed or needs to be released or deactivated in the unauthorized area; at least one QoS data flow in the session is allowed or required to be released or deactivated in the unauthorized area; the session is allowed or needs to be reserved in the unauthorized area; at least one QoS data flow in the session is allowed or needs to be reserved in the unlicensed region.
In some example embodiments of the present application, the fourth information is determined according to single-network slice selection service information S-NSSAI and/or data network name DNN corresponding to the session.
In some example embodiments of the present application, the method further comprises: receiving fifth information sent by the terminal device or another network device in a session establishment and/or modification process, wherein the fifth information includes at least one of the following information: requesting the session to be established, modified or activated in the unlicensed region; requesting at least one QoS data flow in the session to be established, modified or activated in the unlicensed region.
In some example embodiments of the present application, the method further comprises: sending sixth information to the terminal device, where the sixth information includes at least one of the following information: information of sessions or QoS data flows allowed or required to be reserved in the unlicensed region; information of sessions or QoS data flows allowed or required to be released or deactivated in the unlicensed region; information of sessions or QoS data flows to be established, modified or activated in case of said unlicensed area is allowed or required.
In some example embodiments of the present application, the method further comprises: and when the network equipment is in the authorized area, determining whether the third information or the fifth information needs to be sent to the network equipment according to the content of the sixth information.
In some example embodiments of the present application, the sixth information includes information of a session or QoS data flow that is established, modified or activated with the terminal device in the unlicensed region, and the method further includes: and when the unauthorized area exists, determining whether to establish, modify or activate a corresponding session according to the content of the sixth information.
In some example embodiments of the present application, the sixth information is information added in a policy rule of the terminal path selection policy URSP.
In some example embodiments of the present application, the session is a protocol data unit, PDU, session, the PDU session being represented by an attribute parameter of the PDU session.
In some example embodiments of the present application, the sending the second information to the terminal device includes: sending the second information to a Radio Access Network (RAN), and transmitting the second information to the terminal equipment through the RAN; or, the sending the fourth information to the terminal device includes: and sending the fourth information to the RAN, and transmitting the fourth information to the terminal equipment through the RAN.
In some example embodiments of the present application, the network device is a core network element.
In some example embodiments of the present application, the core network element is an access and mobility management function AMF or a session management function SMF.
In some example embodiments of the present application, the network device is a base station, and the method further comprises: receiving second information sent by a core network, wherein the second information comprises at least one of the following information: whether to open the restrictive data communication for the terminal device; information of the authorized area and/or the unauthorized area.
In some example embodiments of the present application, the network device is a base station, and the method further comprises: receiving fourth information sent by a core network, wherein the fourth information comprises at least one of the following information: the session is allowed or needs to be released or deactivated in the unauthorized area; at least one QoS data flow in the session is allowed or required to be released or deactivated in the unauthorized area; the session is allowed or needs to be reserved in the unauthorized area; at least one QoS data flow in the session is allowed or needs to be reserved in the unlicensed region.
Since the communication control method of the network device side is similar to the implementation principle and the technical effect of the communication control method of the terminal device side, no further description is given here.
Fig. 9 is a schematic block diagram of a first embodiment of a communication control apparatus according to an embodiment of the present application. The communication control apparatus is applied to an electronic device, and as shown in fig. 9, the communication control apparatus 900 may include:
a restrictive communication module 910 configured to perform restrictive data communication in a first area, the restrictive data communication including allowing the electronic device to perform data transmission using a portion of the established session in the first area; and/or allowing the electronic device to establish a specific session for data transmission in the first area.
According to the technical solution in the example embodiment of fig. 9, by introducing restrictive data communication on the first area, that is, only allowing the electronic device to use a part of the established session for data transmission in the first area, or allowing the electronic device to establish a specific session for data transmission, the electronic device can maintain or newly establish a specific communication connection on the first area for data communication, so that the electronic device in the first area can be conveniently controlled, and the electronic device is prevented from losing control in the first area.
Fig. 10 is a schematic block diagram of a second embodiment of a communication control apparatus according to an embodiment of the present application. Referring to fig. 10, in some example embodiments of the present application, the apparatus 900 further comprises: a normal communication module 1010, configured to perform data communication normally in the second area.
In some example embodiments of the present application, the second area is an authorized area, and the first area is an unauthorized area.
In some example embodiments of the present application, the partially established session is for communication with a particular server, and the particular session is for communication with the particular server.
In some example embodiments of the present application, the apparatus further comprises: a first sending module, configured to send first information to a network device, where the first information includes at least one of the following information: requesting to open the restrictive data communication; information of the authorized area and/or the unauthorized area.
In some example embodiments of the present application, the apparatus further comprises: a first receiving module, configured to receive second information sent by the network device, where the second information includes at least one of the following information: whether to open the restrictive data communication for the electronic device; information of the authorized area and/or the unauthorized area.
In some example embodiments of the present application, the apparatus further comprises: a second sending module, configured to send third information to a network device in a session establishment and/or modification process, where the third information includes at least one of the following information: requesting that the session be allowed or required to be released or deactivated in the unlicensed region; requesting at least one quality of service, QoS, data flow in the session, allowed or required to be released or deactivated in the unlicensed region; requesting that the session be allowed or need to be reserved in the unauthorized area; requesting at least one QoS data flow in the session, a reservation being allowed or required in the unlicensed region.
In some example embodiments of the present application, the apparatus further comprises: a second receiving module, configured to receive fourth information sent by the network device, where the fourth information includes at least one of the following information: the session is allowed or needs to be released or deactivated in the unauthorized area; at least one QoS data flow in the session is allowed or required to be released or deactivated in the unauthorized area; the session is allowed or needs to be reserved in the unauthorized area; at least one QoS data flow in the session is allowed or needs to be reserved in the unlicensed region.
In some example embodiments of the present application, the fourth information is determined according to single-network slice selection service information S-NSSAI and/or data network name DNN corresponding to the session.
In some example embodiments of the present application, the apparatus further comprises: a third sending module, configured to send fifth information to a network device in a session establishment and/or modification process, where the fifth information includes at least one of the following information: requesting that the session be established, modified or activated in the unlicensed region; requesting at least one QoS data flow in the session to be established, modified or activated in the unlicensed region.
In some example embodiments of the present application, the apparatus further comprises: a third receiving module, configured to receive sixth information sent by the network device, where the sixth information includes at least one of the following information: information of sessions or QoS data flows allowed or required to be reserved in the unlicensed region; information of sessions or QoS data flows allowed or required to be released or deactivated in the unlicensed region; information of sessions or QoS data flows allowed or required to be established, modified or activated in said unlicensed region.
In some example embodiments of the present application, the apparatus further comprises: and the sending determining module is used for determining whether the third information or the fifth information needs to be sent to the network equipment according to the content of the sixth information in the authorized area.
In some example embodiments of the present application, the sixth information includes information of sessions or QoS data flows allowed or required to be established, modified or activated in the unlicensed region, and the apparatus further includes: and the session determining module is used for determining whether to establish, modify or activate the corresponding session according to the content of the sixth information in the unauthorized area.
In some example embodiments of the present application, the sixth information is information added in a policy rule of the terminal path selection policy URSP.
In some example embodiments of the present application, the session is a protocol data unit, PDU, session, which is represented by an attribute parameter of the PDU session.
In some example embodiments of the present application, the first receiving module is further specifically configured to: receiving the second information which is sent to a Radio Access Network (RAN) by the network equipment and is transmitted to the electronic equipment through the RAN; or, the second receiving module is further specifically configured to: and receiving the fourth information which is sent to the RAN by the network equipment and transmitted to the electronic equipment through the RAN.
In some example embodiments of the present application, the electronic device is a terminal device.
In some example embodiments of the present application, the electronic device is a base station.
In some example embodiments of the present application, the electronic device is a first base station, the apparatus further comprising: the second base station is used for acquiring second information and/or fourth information from the first base station under the condition that the terminal equipment is accessed to the second base station; or, the second base station obtains the second information and/or fourth information from the terminal device, where the second information includes at least one of the following information: whether to open the restrictive data communication for the terminal device; information of the authorized area and/or the unauthorized area, the fourth information including at least one of the following information: the session is allowed or needs to be released or deactivated in the unauthorized area; at least one QoS data flow in the session is allowed or required to be released or deactivated in the unauthorized area; the session is allowed or needs to be reserved in the unauthorized area; at least one QoS data flow in the session is allowed or needs to be reserved in the unlicensed region.
The communication control apparatus provided in this embodiment is configured to execute the technical solution on the electronic device side in any of the foregoing method embodiments, and the implementation principle and the technical effect are similar, which are not described herein again.
Fig. 11 is a schematic block diagram of a third embodiment of a communication control apparatus according to an embodiment of the present application. The communication control apparatus is applied to a network device, and as shown in fig. 11, the communication control apparatus 1100 may include:
a restrictive communication module 1110, configured to perform restrictive data communication in a first area, where the restrictive data communication includes allowing terminal devices in the first area to perform data transmission using a part of the established session; and/or allowing the terminal device to establish a specific session for data transmission.
In some example embodiments of the present application, the apparatus further comprises:
and the normal communication module is used for normally carrying out data communication in the second area.
In some example embodiments of the present application, the second area is an authorized area, and the first area is an unauthorized area.
In some example embodiments of the present application, the partially established session is for communication with a particular server, and the particular session is for communication with the particular server.
In some example embodiments of the present application, the apparatus further comprises:
a first receiving module, configured to receive first information sent by the terminal device or another network device, where the first information includes at least one of the following information:
requesting to open the restrictive data communication;
information of the authorized area and/or the unauthorized area.
In some example embodiments of the present application, the apparatus further comprises:
a first sending module, configured to send second information to the terminal device, where the second information includes at least one of the following information:
whether to open the restrictive data communication for the terminal device;
information of the authorized area and/or the unauthorized area.
In some example embodiments of the present application, the apparatus further comprises:
a second receiving module, configured to receive third information sent by the terminal device or another network device in a session establishment and/or modification process, where the third information includes at least one of the following information:
requesting that the session be allowed or required to be released or deactivated in the unlicensed region;
requesting at least one QoS data flow in the session, allowed or required to be released or deactivated in the unlicensed region;
requesting that the session be allowed or need to be reserved in the unauthorized area;
requesting at least one QoS data flow in the session, a reservation being allowed or required in the unlicensed region.
In some example embodiments of the present application, the apparatus further comprises:
a second sending module, configured to send fourth information to the terminal device, where the fourth information includes at least one of the following information:
the session is allowed or needs to be released or deactivated in the unauthorized area;
at least one QoS data flow in the session is allowed or required to be released or deactivated in the unauthorized area;
the session is allowed or needs to be reserved in the unauthorized area;
at least one QoS data flow in the session is allowed or needs to be reserved in the unlicensed region.
In some example embodiments of the present application, the fourth information is determined according to single-network slice selection service information S-NSSAI and/or data network name DNN corresponding to the session.
In some example embodiments of the present application, the apparatus further comprises:
a third receiving module, configured to receive fifth information sent by the terminal device or another network device in a session establishment and/or modification process, where the fifth information includes at least one of the following information:
requesting the session to be established, modified or activated in the unlicensed region;
requesting at least one QoS data flow in the session to be established, modified or activated in the unlicensed region.
In some example embodiments of the present application, the apparatus further comprises:
a third sending module, configured to send sixth information to the terminal device, where the sixth information includes at least one of the following information:
information of sessions or QoS data flows allowed or required to be reserved in the unlicensed region;
information of sessions or QoS data flows allowed or required to be released or deactivated in the unlicensed region;
information of sessions or QoS data flows to be established, modified or activated in case of said unlicensed area is allowed or required.
In some example embodiments of the present application, the apparatus further comprises:
and the sending determining module is used for determining whether the third information or the fifth information needs to be sent to the network equipment according to the content of the sixth information in the authorized area.
In some example embodiments of the present application, the sixth information includes information of a session or a QoS data flow that is established, modified or activated with the terminal device in the unlicensed region, and the apparatus further includes:
and the session determining module is used for determining whether to establish, modify or activate the corresponding session according to the content of the sixth information in the unauthorized area.
In some example embodiments of the present application, the sixth information is information added in a policy rule of the terminal path selection policy URSP.
In some example embodiments of the present application, the session is a protocol data unit, PDU, session, the PDU session being represented by an attribute parameter of the PDU session.
In some example embodiments of the present application, the first sending module is further specifically configured to:
sending the second information to a Radio Access Network (RAN), and transmitting the second information to the terminal equipment through the RAN; or,
the second sending module is further specifically configured to:
and sending the fourth information to the RAN, and transmitting the fourth information to the terminal equipment through the RAN.
In some example embodiments of the present application, the network device is a core network element.
In some example embodiments of the present application, the core network element is an AMF or an SMF.
In some example embodiments of the present application, the network device is a base station, and the apparatus further includes:
a fourth receiving module, configured to receive second information sent by a core network, where the second information includes at least one of the following information:
whether to open the restrictive data communication for the terminal device;
information of the authorized area and/or the unauthorized area.
In some example embodiments of the present application, the network device is a base station, and the apparatus further includes:
a fifth receiving module, configured to receive fourth information sent by a core network, where the fourth information includes at least one of the following information:
the session is allowed or needs to be released or deactivated in the unauthorized area;
at least one QoS data flow in the session is allowed or required to be released or deactivated in the unauthorized area;
the session is allowed or needs to be reserved in the unauthorized area;
at least one QoS data flow in the session is allowed or needs to be reserved in the unlicensed region.
The communication control apparatus provided in this embodiment is configured to execute the technical solution on the network device side in any one of the foregoing method embodiments, and the implementation principle and the technical effect are similar, which are not described herein again.
Fig. 12 is a schematic structural diagram of a first embodiment of a terminal device according to an embodiment of the present application. As shown in fig. 12, the terminal apparatus 1200 includes:
a processor 1220, a memory 1230, a transmitter 1240, an interface 1250 to communicate with network devices; optionally, the terminal device 1200 further comprises a receiver 1210.
The memory 1230 stores computer-executable instructions;
the processor 1220 executes the computer execution instructions stored in the memory, so that the processor 1220 executes the technical solution of the terminal device side in any of the foregoing method embodiments.
Fig. 13 is a schematic structural diagram of a first embodiment of a network device according to an embodiment of the present application, and as shown in fig. 13, the network device 1300 includes:
processor 1310, memory 1320, receiver 1330, interface 1350 to communicate with a terminal device, optionally, the network device 1300 further comprises transmitter 1340;
memory 1320 stores computer-executable instructions;
the processor 1310 executes the computer executable instructions stored in the memory, so that the processor 1310 executes the technical solution of the network device side in any of the method embodiments.
The present application further provides a computer-readable storage medium, in which computer-executable instructions are stored, and when the computer-executable instructions are executed by a processor, the computer-readable storage medium is configured to implement the technical solution on the network device side in any one of the first foregoing method embodiments.
The present application further provides a computer-readable storage medium, where computer-executable instructions are stored in the computer-readable storage medium, and when the computer-executable instructions are executed by a processor, the computer-executable instructions are used to implement the technical solution on the terminal device side in any one of the foregoing method embodiments.
The embodiment of the present application further provides a program, and when the program is executed by a processor, the program is configured to execute the technical solution on the network device side in the foregoing method embodiment.
The embodiment of the present application further provides a program, and when the program is executed by a processor, the program is configured to execute the technical solution on the terminal device side in the foregoing method embodiment.
The embodiment of the present application further provides a computer program product, which includes program instructions, where the program instructions are used to implement the technical solution of the network device side in the foregoing method embodiment.
The embodiment of the present application further provides a computer program product, which includes program instructions, where the program instructions are used to implement the technical solution on the terminal device side in the foregoing method embodiment.
An embodiment of the present application further provides a chip, including: and the processing module and the communication interface can execute the technical scheme of the network equipment side in the method embodiment.
Further, the chip further includes a storage module (e.g., a memory), where the storage module is configured to store instructions, and the processing module is configured to execute the instructions stored by the storage module, and execute the instructions stored in the storage module so that the processing module executes the technical solution on the network device side.
An embodiment of the present application further provides a chip, including: the processing module and the communication interface, the processing module can execute the technical scheme of the terminal device in the foregoing method embodiment.
Further, the chip further includes a storage module (e.g., a memory), where the storage module is configured to store instructions, and the processing module is configured to execute the instructions stored by the storage module, and the execution of the instructions stored in the storage module causes the processing module to execute the technical solution on the terminal device side.
In the several embodiments provided in the present application, it should be understood that the disclosed system, apparatus and method may be implemented in other manners. For example, the above-described apparatus embodiments are merely illustrative, and for example, a division of a unit is merely a logical division, and an actual implementation may have another division, for example, a plurality of units or components may be combined or integrated into another system, or some features may be omitted, or not executed. In addition, the shown or discussed mutual coupling or direct coupling or communication connection may be an indirect coupling or communication connection through some interfaces, devices or units, and may be in an electrical, mechanical or other form.
In the above Specific implementation of the network device and the terminal device, it should be understood that the Processor may be a Central Processing Unit (CPU), other general-purpose processors, a Digital Signal Processor (DSP), an Application Specific Integrated Circuit (ASIC), etc. A general purpose processor may be a microprocessor or the processor may be any conventional processor or the like. The steps of a method disclosed in connection with the present application may be embodied directly in a hardware processor, or in a combination of the hardware and software modules in the processor.
All or a portion of the steps of implementing the above-described method embodiments may be performed by hardware associated with program instructions. The aforementioned program may be stored in a readable memory. When executed, the program performs steps comprising the method embodiments described above; and the aforementioned memory (storage medium) includes: Read-Only Memory (ROM), Random Access Memory (RAM), flash Memory, hard disk, solid state drive, magnetic tape, floppy disk, optical disk, and any combination thereof.

Claims (81)

  1. A communication control method applied to an electronic device, the method comprising:
    performing restricted data communication in a first area, the restricted data communication including allowing data transfer by the electronic device in the first area using a session that has been partially established in a second area; and/or allowing the electronic device to establish a specific session for data transmission in the first area.
  2. The method of claim 1, further comprising:
    and normally performing data communication in the second area.
  3. The method of claim 2, wherein the second region is an authorized region and the first region is an unauthorized region.
  4. The method according to any one of claims 1 to 3, wherein the session that has been partially established in the second area is used for communication with a specific server, and the specific session is used for communication with the specific server.
  5. The method of claim 3 or 4, further comprising:
    sending first information to a network device, wherein the first information comprises at least one of the following information:
    requesting to open the restrictive data communication;
    information of the authorized region and/or the unauthorized region.
  6. The method according to any one of claims 3 to 5, further comprising:
    receiving second information sent by the network equipment, wherein the second information comprises at least one of the following information:
    whether to open the restrictive data communication for the electronic device;
    information of the authorized area and/or the unauthorized area.
  7. The method of claim 3 or 4, further comprising:
    in the session establishment and/or modification process, third information is sent to a network device, wherein the third information includes at least one of the following information:
    requesting that the session be allowed or required to be released or deactivated in the unlicensed region;
    requesting at least one quality of service, QoS, data flow in the session, allowed or required to be released or deactivated in the unlicensed region;
    requesting that the session be allowed or required to be reserved in the unauthorized area;
    requesting at least one QoS data flow in the session, a reservation being allowed or required in the unlicensed region.
  8. The method of any one of claims 3, 4 or 7, further comprising:
    receiving fourth information sent by the network device, wherein the fourth information includes at least one of the following information:
    the session is allowed or needs to be released or deactivated in the unauthorized area;
    at least one QoS data flow in the session is allowed or required to be released or deactivated in the unauthorized area;
    the session is allowed or needs to be reserved in the unauthorized area;
    at least one QoS data flow in the session is allowed or needs to be reserved in the unlicensed region.
  9. The method of claim 8, wherein the fourth information is determined according to single-network slice selection service information S-NSSAI and/or data network name DNN corresponding to the session.
  10. The method according to claim 3 or 4, characterized in that the method further comprises:
    in a session establishment and/or modification process, sending fifth information to a network device, wherein the fifth information includes at least one of the following information:
    requesting that the session be established, modified or activated in the unlicensed region;
    requesting at least one QoS data flow in the session to be established, modified or activated in the unlicensed region.
  11. The method of any one of claims 3, 4, 7, or 10, further comprising:
    receiving sixth information sent by the network device, wherein the sixth information includes at least one of the following information:
    information of sessions or QoS data flows allowed or required to be reserved in the unlicensed region;
    information of sessions or QoS data flows allowed or required to be released or deactivated in the unlicensed region;
    information of sessions or QoS data flows allowed or required to be established, modified or activated in the unlicensed region.
  12. The method of claim 11, further comprising:
    and when the network equipment is in the authorized area, determining whether the third information or the fifth information needs to be sent to the network equipment according to the content of the sixth information.
  13. The method of claim 11, wherein the sixth information comprises information of sessions or QoS data flows allowed or required to be established, modified or activated in the unlicensed region, and wherein the method further comprises:
    and determining whether to establish, modify or activate a corresponding session according to the content of the sixth information in the unauthorized area.
  14. The method according to claim 11, characterized in that said sixth information is information added in a policy rule of a terminal path selection policy URSP.
  15. The method according to any of claims 1 to 14, wherein the session is a protocol data unit, PDU, session, which is represented by an attribute parameter of the PDU session.
  16. The method according to claim 6 or 8, wherein the receiving the second information sent by the network device comprises:
    receiving the second information which is sent to a Radio Access Network (RAN) by the network equipment and is transmitted to the electronic equipment through the RAN;
    or,
    the receiving fourth information sent by the network device includes:
    and receiving the fourth information which is sent to the RAN by the network equipment and transmitted to the electronic equipment through the RAN.
  17. The method according to any one of claims 1 to 16, wherein the electronic device is a terminal device.
  18. The method according to any of claims 1 to 13, wherein the electronic device is a base station.
  19. The method of any of claims 3-5, 7, and 10-14, wherein the electronic device is a first base station, the method further comprising:
    under the condition that the terminal equipment is accessed to a second base station, the second base station obtains second information and/or fourth information from the first base station; or the second base station obtains the second information and/or the fourth information from the terminal device,
    wherein the second information comprises at least one of the following information:
    whether to open the restrictive data communication for the terminal device;
    information of the authorized area and/or the unauthorized area,
    the fourth information includes at least one of:
    the session is allowed or needs to be released or deactivated in the unauthorized area;
    at least one QoS data flow in the session is allowed or required to be released or deactivated in the unauthorized area;
    the session is allowed or needs to be reserved in the unauthorized area;
    at least one QoS data flow in the session is allowed or needs to be reserved in the unlicensed region.
  20. A communication control method applied to a network device, the method comprising:
    performing restricted data communication in a first area, the restricted data communication including allowing terminal devices within the first area to perform data transmission using a portion of a session that has been established in a second area; and/or allowing the terminal device to establish a specific session for data transmission.
  21. The method of claim 20, further comprising:
    and normally performing data communication in the second area.
  22. The method of claim 21, wherein the second region is an authorized region and the first region is an unauthorized region.
  23. The method according to any of claims 20 to 22, wherein the session that has been partially established in the second area is used for communication with a specific server, and the specific session is used for communication with the specific server.
  24. The method according to claim 22 or 23, further comprising:
    receiving first information sent by the terminal device or another network device, wherein the first information includes at least one of the following information:
    requesting to open the restrictive data communication;
    information of the authorized area and/or the unauthorized area.
  25. The method of any one of claims 22 to 24, further comprising:
    sending second information to the terminal device, wherein the second information comprises at least one of the following information:
    whether to open the restrictive data communication for the terminal device;
    information of the authorized area and/or the unauthorized area.
  26. The method of claim 22 or 23, further comprising:
    receiving third information sent by the terminal device or another network device in a session establishment and/or modification process, wherein the third information includes at least one of the following information:
    requesting that the session be allowed or required to be released or deactivated in the unlicensed region;
    requesting at least one QoS data flow in the session, allowed or required to be released or deactivated in the unlicensed region;
    requesting that the session be allowed or need to be reserved in the unauthorized area;
    requesting at least one QoS data flow in the session, a reservation being allowed or required in the unlicensed region.
  27. The method of any one of claims 22, 23 or 26, further comprising:
    sending fourth information to the terminal device, wherein the fourth information includes at least one of the following information:
    the session is allowed or needs to be released or deactivated in the unauthorized area;
    at least one QoS data flow in the session is allowed or required to be released or deactivated in the unauthorized area;
    the session is allowed or needs to be reserved in the unauthorized area;
    at least one QoS data flow in the session is allowed or needs to be reserved in the unlicensed region.
  28. The method of claim 27, wherein the fourth information is determined according to single-network slice selection service information S-NSSAI and/or data network name DNN corresponding to the session.
  29. The method according to claim 22 or 23, further comprising:
    receiving fifth information sent by the terminal device or another network device in a session establishment and/or modification process, wherein the fifth information includes at least one of the following information:
    requesting that the session be allowed or required to be established, modified or activated in the unlicensed region;
    requesting at least one QoS data flow in the session, allowed or required to be established, modified or activated in the unlicensed region.
  30. The method of any one of claims 22, 23, 26, or 29, further comprising:
    sending sixth information to the terminal device, wherein the sixth information includes at least one of the following information:
    information of sessions or QoS data flows allowed or required to be reserved in the unlicensed region;
    information of sessions or QoS data flows allowed or required to be released or deactivated in the unlicensed region;
    information of sessions or QoS data flows to be established, modified or activated in case of said unlicensed area is allowed or required.
  31. The method of claim 30, further comprising:
    and when the network equipment is in the authorized area, determining whether the third information or the fifth information needs to be sent to the network equipment according to the content of the sixth information.
  32. The method of claim 30, wherein the sixth information comprises information of a session or QoS data flow that is established, modified, or activated with the terminal device in the unlicensed region, and wherein the method further comprises:
    and determining whether to establish, modify or activate a corresponding session according to the content of the sixth information in the unauthorized area.
  33. The method according to claim 30, characterised in that said sixth information is information added in the policy rules of a terminal path selection policy, URSP.
  34. The method according to any of claims 20 to 33, wherein the session is a protocol data unit, PDU, session, which is represented by an attribute parameter of the PDU session.
  35. The method according to claim 25 or 27, wherein said sending second information to the terminal device comprises:
    sending the second information to a Radio Access Network (RAN), and transmitting the second information to the terminal equipment through the RAN; or,
    the sending fourth information to the terminal device includes:
    and sending the fourth information to the RAN, and transmitting the fourth information to the terminal equipment through the RAN.
  36. The method according to any of claims 20 to 35, wherein the network device is a core network element.
  37. The method according to claim 36, wherein said core network element is an access and mobility management function, AMF, or a session management function, SMF.
  38. The method of claim 22 or 23, wherein the network device is a base station, and wherein the method further comprises:
    receiving second information sent by a core network, wherein the second information comprises at least one of the following information:
    whether to open the restrictive data communication for the terminal device;
    information of the authorized region and/or the unauthorized region.
  39. The method of claim 22 or 23, wherein the network device is a base station, and wherein the method further comprises:
    receiving fourth information sent by a core network, wherein the fourth information comprises at least one of the following information:
    the session is allowed or needs to be released or deactivated in the unauthorized area;
    at least one QoS data flow in the session is allowed or required to be released or deactivated in the unauthorized area;
    the session is allowed or needs to be reserved in the unauthorized area;
    at least one QoS data flow in the session is allowed or needs to be reserved in the unlicensed region.
  40. A communication control apparatus, applied to an electronic device, the apparatus comprising:
    a restrictive communication module for restrictive data communication in a first area, the restrictive data communication including allowing the electronic device to use a session partially established in a second area for data transmission in the first area; and/or allowing the electronic device to establish a specific session for data transmission in the first area.
  41. The apparatus of claim 40, further comprising:
    and the normal communication module is used for normally carrying out data communication in the second area.
  42. The apparatus of claim 41, wherein the second region is an authorized region and the first region is an unauthorized region.
  43. The apparatus according to any of claims 40-42, wherein the session that has been established partially in the second area is used for communication with a specific server, and wherein the specific session is used for communication with the specific server.
  44. The apparatus of claim 42 or 43, further comprising:
    a first sending module, configured to send first information to a network device, where the first information includes at least one of the following information:
    requesting to open the restrictive data communication;
    information of the authorized area and/or the unauthorized area.
  45. The apparatus of any one of claims 42 to 44, further comprising:
    a first receiving module, configured to receive second information sent by the network device, where the second information includes at least one of the following information:
    whether to open the restrictive data communication for the electronic device;
    information of the authorized area and/or the unauthorized area.
  46. The apparatus of claim 42 or 43, further comprising:
    a second sending module, configured to send third information to a network device in a session establishment and/or modification process, where the third information includes at least one of the following information:
    requesting that the session be allowed or required to be released or deactivated in the unlicensed region;
    requesting at least one quality of service, QoS, data flow in said session, allowed or required to be released or deactivated in said unlicensed region;
    requesting that the session be allowed or need to be reserved in the unauthorized area;
    requesting at least one QoS data flow in the session, a reservation being allowed or required in the unlicensed region.
  47. The apparatus of any one of claims 42, 43 or 46, further comprising:
    a second receiving module, configured to receive fourth information sent by the network device, where the fourth information includes at least one of the following information:
    the session is allowed or needs to be released or deactivated in the unauthorized area;
    at least one QoS data flow in the session is allowed or required to be released or deactivated in the unauthorized area;
    the session is allowed or needs to be reserved in the unauthorized area;
    at least one QoS data flow in the session is allowed or needs to be reserved in the unlicensed region.
  48. The apparatus of claim 47, wherein the fourth information is determined according to single-network slice selection service information S-NSSAI and/or data network name DNN corresponding to the session.
  49. The apparatus of claim 42 or 43, further comprising:
    a third sending module, configured to send fifth information to the network device in a session establishment and/or modification process, where the fifth information includes at least one of the following information:
    requesting that the session be established, modified or activated in the unlicensed region;
    requesting at least one QoS data flow in the session to be established, modified or activated in the unlicensed region.
  50. The apparatus of any one of claims 42, 43, 46 or 49, further comprising:
    a third receiving module, configured to receive sixth information sent by the network device, where the sixth information includes at least one of the following information:
    information of sessions or QoS data flows allowed or required to be reserved in the unlicensed region;
    information of sessions or QoS data flows allowed or required to be released or deactivated in the unlicensed region;
    information of sessions or QoS data flows allowed or required to be established, modified or activated in the unlicensed region.
  51. The apparatus of claim 50, further comprising:
    and the sending determining module is used for determining whether the third information or the fifth information needs to be sent to the network equipment according to the content of the sixth information in the authorized area.
  52. The apparatus of claim 50, wherein the sixth information comprises information of sessions or QoS data flows allowed or required to be established, modified or activated in the unlicensed region, and wherein the apparatus further comprises:
    and the session determining module is used for determining whether to establish, modify or activate the corresponding session according to the content of the sixth information in the unauthorized area.
  53. The apparatus according to claim 50, wherein the sixth information is information added in a policy rule of a terminal path selection policy URSP.
  54. The apparatus according to any of claims 40 to 53, wherein the session is a protocol data Unit, PDU, session, the PDU session being represented by an attribute parameter of the PDU session.
  55. The apparatus according to claim 45 or 47, wherein the first receiving module is further configured to:
    receiving the second information which is sent to a Radio Access Network (RAN) by the network equipment and is transmitted to the electronic equipment through the RAN;
    or,
    the second receiving module is specifically further configured to:
    and receiving the fourth information which is sent to the RAN by the network equipment and transmitted to the electronic equipment through the RAN.
  56. The apparatus according to any one of claims 40 to 55, wherein the electronic device is a terminal device.
  57. The apparatus of any one of claims 40-52, wherein the electronic device is a base station.
  58. The apparatus of any one of claims 42-44, 46, 49-53, wherein the electronic device is a first base station, the apparatus further comprising:
    the second base station is used for acquiring second information and/or fourth information from the first base station under the condition that the terminal equipment is accessed to the second base station; or the second base station obtains the second information and/or the fourth information from the terminal device,
    wherein the second information comprises at least one of the following information:
    whether to open the restrictive data communication for the terminal device;
    information of the authorized area and/or the unauthorized area,
    the fourth information includes at least one of:
    the session is allowed or needs to be released or deactivated in the unauthorized area;
    at least one QoS data flow in the session is allowed or required to be released or deactivated in the unauthorized area;
    the session is allowed or needs to be reserved in the unauthorized area;
    at least one QoS data flow in the session is allowed or needs to be reserved in the unlicensed region.
  59. A communication control apparatus, applied to a network device, the apparatus comprising:
    the restricted data communication module is used for performing restricted data communication in a first area, and the restricted data communication comprises the steps of allowing terminal equipment in the first area to perform data transmission by using a session partially established in a second area; and/or allowing the terminal device to establish a specific session for data transmission.
  60. The apparatus of claim 59, further comprising:
    and the normal communication module is used for normally carrying out data communication in the second area.
  61. The apparatus of claim 60, wherein the second zone is an authorized zone and the first zone is an unauthorized zone.
  62. The apparatus according to any one of claims 59 to 61, wherein the session that has been partially established in the second area is used for communication with a specific server, and wherein the specific session is used for communication with the specific server.
  63. The apparatus of claim 61 or 62, further comprising:
    a first receiving module, configured to receive first information sent by the terminal device or another network device, where the first information includes at least one of the following information:
    requesting to open the restrictive data communication;
    information of the authorized area and/or the unauthorized area.
  64. The apparatus of any one of claims 61 to 63, further comprising:
    a first sending module, configured to send second information to the terminal device, where the second information includes at least one of the following information:
    whether to open the restrictive data communication for the terminal device;
    information of the authorized area and/or the unauthorized area.
  65. The apparatus of claim 61 or 62, further comprising:
    a second receiving module, configured to receive third information sent by the terminal device or another network device in a session establishment and/or modification process, where the third information includes at least one of the following information:
    requesting that the session be allowed or required to be released or deactivated in the unlicensed region;
    requesting at least one QoS data flow in the session, allowed or required to be released or deactivated in the unlicensed region;
    requesting that the session be allowed or need to be reserved in the unauthorized area;
    requesting at least one QoS data flow in the session, a reservation being allowed or required in the unlicensed region.
  66. The apparatus of any one of claims 61, 62, or 65, further comprising:
    a second sending module, configured to send fourth information to the terminal device, where the fourth information includes at least one of the following information:
    the session is allowed or needs to be released or deactivated in the unauthorized area;
    at least one QoS data flow in the session is allowed or required to be released or deactivated in the unauthorized area;
    the session is allowed or needs to be reserved in the unauthorized area;
    at least one QoS data flow in the session is allowed or needs to be reserved in the unlicensed region.
  67. The apparatus of claim 66, wherein the fourth information is determined according to single-network slice selection service information (S-NSSAI) and/or Data Network Name (DNN) corresponding to the session.
  68. The apparatus of claim 61 or 62, further comprising:
    a third receiving module, configured to receive fifth information sent by the terminal device or another network device in a session establishment and/or modification process, where the fifth information includes at least one of the following information:
    requesting that the session be allowed or required to be established, modified or activated in the unlicensed region;
    requesting at least one QoS data flow in the session, allowed or required to be established, modified or activated in the unlicensed region.
  69. The apparatus of any one of claims 61, 62, 65, or 67, further comprising:
    a third sending module, configured to send sixth information to the terminal device, where the sixth information includes at least one of the following information:
    information of sessions or QoS data flows allowed or required to be reserved in the unlicensed region;
    information of sessions or QoS data flows allowed or required to be released or deactivated in the unlicensed region;
    information of sessions or QoS data flows that are allowed or required to be established, modified or activated in case of said unlicensed area.
  70. The apparatus of claim 69, further comprising:
    and the sending determining module is used for determining whether the third information or the fifth information needs to be sent to the network equipment according to the content of the sixth information in the authorized area.
  71. The apparatus of claim 69, wherein the sixth information comprises information of a session or QoS data flow that is established, modified or activated with the terminal device in the unlicensed region, and wherein the apparatus further comprises:
    and the session determining module is used for determining whether to establish, modify or activate the corresponding session according to the content of the sixth information in the unauthorized area.
  72. The apparatus of claim 69, wherein the sixth information is information added in a policy rule of a terminal path selection policy (URSP).
  73. The apparatus according to any of claims 59 to 72, wherein the session is a protocol data unit, PDU, session, the PDU session being represented by an attribute parameter of the PDU session.
  74. The apparatus according to claim 64 or 66, wherein the first sending module is further configured to:
    sending the second information to a Radio Access Network (RAN), and transmitting the second information to the terminal equipment through the RAN; or,
    the second sending module is further specifically configured to:
    and sending the fourth information to the RAN, and transmitting the fourth information to the terminal equipment through the RAN.
  75. The apparatus according to any of claims 59 to 74, wherein the network device is a core network element.
  76. The apparatus of claim 75, wherein the core network element is AMF or SMF.
  77. The apparatus of claim 61 or 62, wherein the network device is a base station, the apparatus further comprising:
    a fourth receiving module, configured to receive second information sent by a core network, where the second information includes at least one of the following information:
    whether to open the restrictive data communication for the terminal device;
    information of the authorized region and/or the unauthorized region.
  78. The apparatus of claim 61 or 62, wherein the network device is a base station, the apparatus further comprising:
    a fifth receiving module, configured to receive fourth information sent by a core network, where the fourth information includes at least one of the following information:
    the session is allowed or needs to be released or deactivated in the unauthorized area;
    at least one QoS data flow in the session is allowed or required to be released or deactivated in the unauthorized area;
    the session is allowed or needs to be reserved in the unauthorized area;
    at least one QoS data flow in the session is allowed or needs reserved information in the unauthorized area.
  79. An electronic device, comprising:
    a processor, a memory, a transmitter and an interface for communicating with a network device or a terminal device;
    the memory stores computer execution instructions;
    the processor executing computer-executable instructions stored by the memory causes the processor to perform the communication control method of any of claims 1-19.
  80. A network device, comprising:
    a processor, a memory, a receiver, and an interface for communicating with a terminal device;
    the memory stores computer-executable instructions;
    the processor executing the computer-executable instructions stored by the memory causes the processor to perform the communication control method of any of claims 20 to 39.
  81. A computer-readable storage medium having stored thereon computer-executable instructions for implementing the communication control method of any one of claims 1 to 19 or 20 to 39 when the computer-executable instructions are executed by a processor.
CN202080095376.9A 2020-04-03 2020-04-03 Communication control method, device, equipment and storage medium Active CN115039390B (en)

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/CN2020/083379 WO2021196241A1 (en) 2020-04-03 2020-04-03 Communication control method and apparatus, device, and storage medium

Publications (2)

Publication Number Publication Date
CN115039390A true CN115039390A (en) 2022-09-09
CN115039390B CN115039390B (en) 2023-09-12

Family

ID=77928912

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202080095376.9A Active CN115039390B (en) 2020-04-03 2020-04-03 Communication control method, device, equipment and storage medium

Country Status (2)

Country Link
CN (1) CN115039390B (en)
WO (1) WO2021196241A1 (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN116567050A (en) * 2022-01-29 2023-08-08 华为技术有限公司 Authorization method and device

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108351645A (en) * 2015-11-17 2018-07-31 深圳市大疆创新科技有限公司 System and method for managing flight restriction region
WO2018161796A1 (en) * 2017-03-08 2018-09-13 华为技术有限公司 Connection processing method and apparatus in multi-access scenario
CN109983792A (en) * 2017-02-06 2019-07-05 华为技术有限公司 A kind of data processing method, apparatus and system
CN110366216A (en) * 2018-04-10 2019-10-22 华为技术有限公司 The method and communication device of communication

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9601022B2 (en) * 2015-01-29 2017-03-21 Qualcomm Incorporated Systems and methods for restricting drone airspace access
US9928748B2 (en) * 2015-11-25 2018-03-27 International Business Machines Corporation Dynamic geo-fence for drone
CN205751276U (en) * 2016-05-16 2016-11-30 北华大学 A kind of movable unmanned helicopter flight range limits system
US10393528B2 (en) * 2017-08-02 2019-08-27 Wing Aviation Llc Systems and methods for navigation path determination for unmanned vehicles

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108351645A (en) * 2015-11-17 2018-07-31 深圳市大疆创新科技有限公司 System and method for managing flight restriction region
CN109983792A (en) * 2017-02-06 2019-07-05 华为技术有限公司 A kind of data processing method, apparatus and system
WO2018161796A1 (en) * 2017-03-08 2018-09-13 华为技术有限公司 Connection processing method and apparatus in multi-access scenario
CN110366216A (en) * 2018-04-10 2019-10-22 华为技术有限公司 The method and communication device of communication

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
INTEL CORPORATION (UK) LTD: "S1-172211 \"Use cases for applications targeting the Media amp;amp; Entertainment vertical: the vision of the research funded projects PMSE-xG.\"", 3GPP TSG_SA\\WG1_SERV *

Also Published As

Publication number Publication date
CN115039390B (en) 2023-09-12
WO2021196241A1 (en) 2021-10-07

Similar Documents

Publication Publication Date Title
WO2019192417A1 (en) Service diversion indication method and device
CN114503536B (en) Communication related to changes in application servers
US11706705B2 (en) Multimedia priority service
US20210168151A1 (en) Method for implementing user plane security policy, apparatus, and system
CN114600504B (en) Method for moving IMS voice session on non-3 GPP to 3GPP access
CN114342549B (en) Method and apparatus for connecting networks
US20220182861A1 (en) Pmf support scheme for ma pdu session
US20230189208A1 (en) Processing method of amf for supporting multiple usims
CN114557031B (en) Method for moving PDU session on non-3 GPP to 3GPP access
WO2020217224A1 (en) Amf and scp behavior in delegated discovery of pcf
CN113676904B (en) Slice authentication method and device
WO2022199451A1 (en) Session switching method and apparatus
CN115039390B (en) Communication control method, device, equipment and storage medium
US20220322152A1 (en) Method for measuring performance for qos
US20230074413A1 (en) Communication related to network slice
CN116711377A (en) Handover of communication network
CN115484582A (en) Communication method and communication device
US20230319568A1 (en) Selection of a security edge protection proxy
US20220386401A1 (en) Multiple Access
US20230199599A1 (en) Method and device used for wireless communication
EP4216622A2 (en) Network registration method for traffic steering and device supporting the same
US20240064580A1 (en) Method and apparatus for handover of terminal in wireless communication system
CN116709291A (en) Communication method and device
CN117204025A (en) Method for measuring QoS performance
CN117062179A (en) Communication method, communication device, access network equipment and terminal equipment of network slice

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant