CN117015002A - Policy acquisition method and device - Google Patents

Policy acquisition method and device Download PDF

Info

Publication number
CN117015002A
CN117015002A CN202310374161.6A CN202310374161A CN117015002A CN 117015002 A CN117015002 A CN 117015002A CN 202310374161 A CN202310374161 A CN 202310374161A CN 117015002 A CN117015002 A CN 117015002A
Authority
CN
China
Prior art keywords
network
terminal
information
n3iwf
policy
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202310374161.6A
Other languages
Chinese (zh)
Inventor
张奕忠
谢振华
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Vivo Mobile Communication Co Ltd
Original Assignee
Vivo Mobile Communication Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Vivo Mobile Communication Co Ltd filed Critical Vivo Mobile Communication Co Ltd
Publication of CN117015002A publication Critical patent/CN117015002A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W48/00Access restriction; Network selection; Access point selection
    • H04W48/18Selecting a network or a communication service
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W36/00Hand-off or reselection arrangements
    • H04W36/14Reselecting a network or an air interface
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W72/00Local resource management
    • H04W72/50Allocation or scheduling criteria for wireless resources
    • H04W72/535Allocation or scheduling criteria for wireless resources based on resource usage policies

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The application discloses a policy acquisition method and a policy acquisition device, which belong to the technical field of communication, and the policy acquisition method in the embodiment of the application comprises the following steps: and under the condition that the terminal accesses the first network through the LTE wireless system, accessing the second network through the N3IWF, and acquiring the strategy of the second network.

Description

Policy acquisition method and device
Technical Field
The application belongs to the technical field of communication, and particularly relates to a strategy acquisition method and device.
Background
The terminal may use the policies of the second network in the first network, but when the policies of the second network are updated in the second network, there is no way to provide updated policies for the terminal in the first network.
Therefore, how to maintain a consistent policy between the first network and the second network is a problem that needs to be addressed.
Disclosure of Invention
The embodiment of the application provides a policy acquisition method and a policy acquisition device, which can solve the problem of how to keep a consistent policy between a first network and a second network.
In a first aspect, a policy acquisition method is provided, the method including:
and under the condition that the terminal accesses the first network through the LTE wireless system, accessing the second network through the N3IWF, and acquiring the strategy of the second network.
In a second aspect, a policy acquisition method is provided, the method including:
the first network element sends first information to the terminal through the second network element;
the first network element supports a protocol of a first network and supports a protocol of a second network, the second network element supports the protocol of the first network, the terminal accesses the first network through an LTE wireless system, and the first information is used for at least one of the following:
the terminal selects N3IWF, wherein the N3IWF is used for accessing the terminal into a second network;
the terminal accesses a second network through an N3IWF based on the first information.
In a third aspect, a policy acquisition method is provided, the method including:
the second network element receives second information from the terminal;
the second network element sends second indication information to the first network element based on the second information;
the second indication information is used for the first network element to send first information to the terminal through the second network element, and the first information is used for at least one of the following:
the terminal selects N3IWF, wherein the N3IWF is used for accessing the terminal into a second network;
the terminal accesses a second network through an N3IWF based on the first information;
The first network element supports a first network protocol and supports a protocol of the second network, the second network element supports the protocol of the first network, and the terminal accesses the first network through an LTE wireless system.
In a fourth aspect, there is provided a policy acquisition device, including:
the first acquisition module is used for accessing a second network through an N3IWF under the condition of accessing the first network through an LTE wireless system, and acquiring a strategy of the second network.
In a fifth aspect, there is provided a policy acquisition device, including:
the first sending module is used for sending the first information to the terminal through the second network element;
the first network element supports a protocol of a first network and supports a protocol of a second network, the second network element supports the protocol of the first network, the terminal accesses the first network through an LTE wireless system, and the first information is used for at least one of the following:
the terminal selects N3IWF, wherein the N3IWF is used for accessing the terminal into a second network;
the terminal accesses a second network through an N3IWF based on the first information.
In a sixth aspect, there is provided a policy acquisition device, the device comprising:
The first receiving module is used for receiving second information from the terminal;
the second sending module is used for sending second indication information to the first network element based on the second information;
the second indication information is used for the first network element to send first information to the terminal through the second network element, and the first information is used for at least one of the following:
the terminal selects N3IWF, wherein the N3IWF is used for accessing the terminal into a second network;
the terminal accesses a second network through an N3IWF based on the first information;
the first network element supports a first network protocol and supports a protocol of the second network, the second network element supports the protocol of the first network, and the terminal accesses the first network through an LTE wireless system.
In a seventh aspect, there is provided a terminal comprising a processor and a memory storing a program or instructions executable on the processor, which when executed by the processor implements the policy acquisition method according to the first aspect.
In an eighth aspect, a terminal is provided, including a processor and a communication interface, where the communication interface is configured to:
and under the condition of accessing the first network through the LTE wireless system, accessing the second network through the N3IWF, and acquiring the strategy of the second network.
In a ninth aspect, there is provided a first network element comprising a processor and a memory storing a program or instructions executable on the processor, which when executed by the processor implements the policy acquisition method according to the second aspect.
In a tenth aspect, a first network element is provided, including a processor and a communication interface, where the communication interface is configured to:
sending the first information to the terminal through the second network element;
the first network element supports a protocol of a first network and supports a protocol of a second network, the second network element supports the protocol of the first network, the terminal accesses the first network through an LTE wireless system, and the first information is used for at least one of the following:
the terminal selects N3IWF, wherein the N3IWF is used for accessing the terminal into a second network;
the terminal accesses a second network through an N3IWF based on the first information.
In an eleventh aspect, there is provided a second network element comprising a processor and a memory storing a program or instructions executable on the processor, which when executed by the processor implements the policy acquisition method according to the third aspect.
In a twelfth aspect, a second network element is provided, including a processor and a communication interface, where the communication interface is configured to:
receiving second information from the terminal;
based on the second information, sending second indication information to the first network element;
the second indication information is used for the first network element to send first information to the terminal through the second network element, and the first information is used for at least one of the following:
the terminal selects N3IWF, wherein the N3IWF is used for accessing the terminal into a second network;
the terminal accesses a second network through an N3IWF based on the first information;
the first network element supports a first network protocol and supports a protocol of the second network, the second network element supports the protocol of the first network, and the terminal accesses the first network through an LTE wireless system.
In a thirteenth aspect, there is provided a policy acquisition system comprising: a terminal, a first network element and a second network element, the terminal being operable to perform the steps of the policy acquisition method according to the first aspect, the first network element being operable to perform the steps of the policy acquisition method according to the second aspect, the second network element being operable to perform the steps of the policy acquisition method according to the third aspect.
In a fourteenth aspect, there is provided a readable storage medium having stored thereon a program or instructions which when executed by a processor, perform the steps of the method according to the first aspect, or perform the steps of the method according to the second aspect, or perform the steps of the method according to the third aspect.
In a fifteenth aspect, there is provided a chip comprising a processor and a communication interface, the communication interface and the processor being coupled, the processor being for running a program or instructions, implementing the steps of the method as described in the first aspect, or implementing the steps of the method as described in the second aspect, or implementing the steps of the method as described in the third aspect.
In a sixteenth aspect, there is provided a computer program/program product stored in a storage medium, the computer program/program product being executable by at least one processor to perform the steps of the method as described in the first aspect, or to perform the steps of the method as described in the second aspect, or to perform the steps of the method as described in the third aspect.
In the embodiment of the application, under the condition that the terminal is accessed to the first network, the terminal can be accessed to the second network through the N3IWF to acquire the strategy of the second network, so that the consistent strategy between the first network and the second network can be ensured.
Drawings
Fig. 1 shows a block diagram of a wireless communication system to which embodiments of the present application are applicable;
FIG. 2 is a schematic flow chart of a policy obtaining method according to an embodiment of the present application;
FIG. 3 is a second flowchart of a policy obtaining method according to an embodiment of the present application;
FIG. 4 is a third flow chart of a policy obtaining method according to an embodiment of the present application;
FIG. 5 is a flowchart of a policy obtaining method according to an embodiment of the present application;
FIG. 6 is a flowchart of a policy obtaining method according to an embodiment of the present application;
fig. 7 is a schematic structural diagram of a policy obtaining device according to an embodiment of the present application;
FIG. 8 is a second schematic diagram of a policy obtaining device according to an embodiment of the present application;
FIG. 9 is a third schematic diagram of a policy obtaining device according to an embodiment of the present application;
fig. 10 is a schematic structural diagram of a communication device according to an embodiment of the present application;
fig. 11 is a schematic diagram of a hardware structure of a terminal implementing an embodiment of the present application;
fig. 12 is a schematic hardware structure of a first network element implementing an embodiment of the present application;
fig. 13 is a schematic hardware structure of a second network element for implementing an embodiment of the present application.
Detailed Description
The technical solutions of the embodiments of the present application will be clearly described below with reference to the drawings in the embodiments of the present application, and it is apparent that the described embodiments are some embodiments of the present application, but not all embodiments. All other embodiments, which are derived by a person skilled in the art based on the embodiments of the application, fall within the scope of protection of the application.
The terms first, second and the like in the description and in the claims, are used for distinguishing between similar elements and not necessarily for describing a particular sequential or chronological order. It is to be understood that the terms so used are interchangeable under appropriate circumstances such that the embodiments of the application are capable of operation in sequences other than those illustrated or otherwise described herein, and that the "first" and "second" distinguishing between objects generally are not limited in number to the extent that the first object may, for example, be one or more. Furthermore, in the description and claims, "and/or" means at least one of the connected objects, and the character "/" generally means a relationship in which the associated object is an "or" before and after.
It should be noted that the techniques described in the embodiments of the present application are not limited to long term evolution (Long Term Evolution, LTE)/LTE evolution (LTE-Advanced, LTE-a) systems, but may also be used in other wireless communication systems, such as code division multiple access (Code Division Multiple Access, CDMA), time division multiple access (Time Division Multiple Access, TDMA), frequency division multiple access (Frequency Division Multiple Access, FDMA), orthogonal frequency division multiple access (Orthogonal Frequency Division Multiple Access, OFDMA), single carrier frequency division multiple access (Single-carrier Frequency Division Multiple Access, SC-FDMA), and other systems. The terms "system" and "network" in embodiments of the application are often used interchangeably, and the techniques described may be used for both the above-mentioned systems and radio technologies, as well as other systems and radio technologies. The following description describes a New air interface (NR) system for purposes of example, and NR terminology is used in much of the description that follows, although these techniques may also be applied For applications other than NR system applications, e.g. generation 6 (6 th Generation, 6G) communication system.
Fig. 1 shows a block diagram of a wireless communication system to which an embodiment of the present application is applicable. The wireless communication system includes a terminal 11 and a network device 12. The terminal 11 may be a mobile phone, a tablet (Tablet Personal Computer), a Laptop (Laptop Computer) or a terminal-side Device called a notebook, a personal digital assistant (Personal Digital Assistant, PDA), a palm top, a netbook, an ultra-mobile personal Computer (ultra-mobile personal Computer, UMPC), a mobile internet appliance (Mobile Internet Device, MID), an augmented reality (augmented reality, AR)/Virtual Reality (VR) Device, a robot, a Wearable Device (weather Device), a vehicle-mounted Device (VUE), a pedestrian terminal (PUE), a smart home (home Device with a wireless communication function, such as a refrigerator, a television, a washing machine, or a furniture), a game machine, a personal Computer (personal Computer, PC), a teller machine, or a self-service machine, and the Wearable Device includes: intelligent wrist-watch, intelligent bracelet, intelligent earphone, intelligent glasses, intelligent ornament (intelligent bracelet, intelligent ring, intelligent necklace, intelligent anklet, intelligent foot chain etc.), intelligent wrist strap, intelligent clothing etc.. It should be noted that the specific type of the terminal 11 is not limited in the embodiment of the present application. The network-side device 12 may comprise an access network device or a core network device, wherein the access network device 12 may also be referred to as a radio access network device, a radio access network (Radio Access Network, RAN), a radio access network function or a radio access network element. Access network device 12 may include a base station, a WLAN access point, a WiFi node, or the like, which may be referred to as a node B, an evolved node B (eNB), an access point, a base transceiver station (Base Transceiver Station, BTS), a radio base station, a radio transceiver, a basic service set (Basic Service Set, BSS), an extended service set (Extended Service Set, ESS), a home node B, a home evolved node B, a transmission and reception point (Transmitting Receiving Point, TRP), or some other suitable terminology in the art, and the base station is not limited to a particular technical vocabulary so long as the same technical effect is achieved, and it should be noted that in the embodiment of the present application, only a base station in the NR system is described as an example, and the specific type of the base station is not limited. The core network device may include, but is not limited to, at least one of: core network nodes, core network functions, mobility management entities (Mobility Management Entity, MME), access mobility management functions (Access and Mobility Management Function, AMF), session management functions (Session Management Function, SMF), user plane functions (User Plane Function, UPF), policy control functions (Policy Control Function, PCF), policy and charging rules function units (Policy and Charging Rules Function, PCRF), edge application service discovery functions (Edge Application Server Discovery Function, EASDF), unified data management (Unified Data Management, UDM), unified data repository (Unified Data Repository, UDR), home subscriber server (Home Subscriber Server, HSS), centralized network configuration (Centralized network configuration, CNC), network storage functions (Network Repository Function, NRF), network opening functions (Network Exposure Function, NEF), local NEF (or L-NEF), binding support functions (Binding Support Function, BSF), application functions (Application Function, AF), and the like. It should be noted that, in the embodiment of the present application, only the core network device in the NR system is described as an example, and the specific type of the core network device is not limited.
The network element in the present application, for example, the first network element or the second network element, etc., may be one or more of the core network devices, or may also be one or more core network functions. In the present application, the core network functions may include AMF, PCF, SMF, etc., where the PCF may be PCF (PCF for session) of the serving session, or PCF (PCF for UE) of the serving UE, or UE-PCF, or SM-PCF, etc.
The policy obtaining method and device provided by the embodiment of the application are described in detail below through some embodiments and application scenarios thereof with reference to the accompanying drawings.
The following will be described first:
(1) A User Equipment (UE), which may be a terminal for example, may use a user equipment routing policy (user equipment routing selection policy, urs) (a policy of 5 GS) in an evolved packet system (Evolved Packet System, EPS) to derive parameters of the EPS:
if the UE:
support S1 mode and N1 mode;
there are no pre-configured rules for associating an application to a packet data network (Packet Data Network, PDN) connection, non-Seamless (Non-session) Non-3 GPP offload, or 5G proximity services (ProSe) layer three UE-to-network relay offload (i.e., there are no rules in the UE local configuration that apply to the application, nor ANDSF rules that apply to the application); and
Equipped with a urs;
while in S1 mode, the UE shall use the matched urs rules (if available) to derive parameters, e.g. APN, using the mapping between parameters in the urs rules and parameters specified by the protocol for PDN connection establishment. The urs rules with EPS policy parameters are used to associate applications with PDN connections, non-seamless non-3 GPP offload or 5G proximity services (ProSe) layer three UE-to-network relay offload. The priority of the urs rules is reused in EPS.
Fig. 2 is a schematic flow chart of a policy obtaining method according to an embodiment of the present application, as shown in fig. 2, where the method includes:
step 200, a terminal accesses a second network through an N3IWF under the condition of accessing a first network through an LTE wireless system, and obtains a strategy of the second network.
Alternatively, the first network may be a fourth generation mobile communication network (4G network);
alternatively, the second network may be a fifth generation mobile communication network (5G network);
alternatively, the policy of the second network may be a urs rule;
alternatively, the access network over LTE radio may be an access to EPS/EPC over E-UTRAN or an access to 5GC over E-UTRAN.
Alternatively, the UE may use a routing component (e.g., DNN) in the urs rules of the EPS, but when the urs rules are updated on the network side, the related art cannot provide updated urs rules for the UE in the EPS. Therefore, how to maintain consistent urs between 5GC and EPC is a need for research to UE.
This scenario arises where a urs p is required to be used in EPS, for example:
scene one: the UE has 4G and 5G capabilities. When the UE is started, the 5G network coverage is not available, and the UE is registered in the 4G network. At this point, if the 5GS updates the urs rules, then the urs in the EPS are not up to date, or the UE does not have a urs at this point.
Scene II: the UE enters the 4G mode from 5G, and long time passes for the urs to update at 5GS, but since the UE is still in EPS, the urs cannot be updated.
Alternatively, when the UE: the method comprises the steps of (1) supporting two modes of EPS and 5GS, (2) not configuring proper EPS policy parameters, (3) obtaining policy parameters in EPS through the corresponding relation (taking table 1 as an example) between EPS and 5GS policy parameters URSP in EPS when URSP exists, and establishing PDN connection.
The embodiment of the application can provide a method for acquiring a 5GS strategy in EPS by UE.
It should be noted that when the UE is in EPS, the UE may use a routing component (e.g., DNN) in the urs rules to derive EPS parameters. Wherein:
(a) If the UE remains connected with the 5GS, the UE policy can be updated through the 5 GS; and
(b) If the UE does not need to use URSP in EPS, then the UE does not need to update the policy.
Thus, the UE only updates the UE policy in EPS when the urs are to be used to derive EPS parameters.
The embodiment of the application provides a solution based on a user plane UP (namely, 5GS is accessed through N3 IWF), which can reduce the influence on a network and UE as much as possible; it may not be restricted whether the UE is registered in 5 GS.
Assuming that the UE is not registered with 5GS, the UE does not have any service NF (e.g. access and mobility management function (access and mobility managementfunction, AMF), UDM). In this case, if the 5GS wants to update UE policies for UEs in the EPS, the 5GS should select all a series of relevant NFs for UEs not in the 5GS, which has a great impact on the current 5GS design. Furthermore, even if the UE is already registered in 5GS, there is no guarantee whether the AMF or UE-PCF will retain the UE context. The AMF may de-register the UE in case of a reachability timeout.
Optionally, registration by untrusted non-3 GPP access and establishment of UE policy association or modification procedures, re-used to provide UE policy to the UE by the N3IWF, may not require additional new signaling or interfaces.
In the embodiment of the application, under the condition that the terminal is accessed to the first network, the terminal can be accessed to the second network through the N3IWF to acquire the strategy of the second network, so that the consistent strategy between the first network and the second network can be ensured.
In some embodiments, when the terminal accesses the first network through the LTE system, that is, the first network may be a 4G network, and the second network may be a 5G or a network corresponding to a version iterated after 5G. Taking the second network as a 5G network as an example, that is, if the terminal is successfully accessed in the 4G network, the terminal accesses the 5G network through the N3IWF at the same time, so as to obtain the policy terminal routing policy (UE Route Selection Policy, urs) in the 5G.
In addition, in some embodiments, for the scenario that the UE is accessed by both 3GPP and non-3GPP of the same PLMN and provides services at the same time, that is, the UE may access the second network (5G network) through both 3GPP access and non-3GPP access, then, when this terminal, during the movement from 5GS to EPS using the N26 interface, if any UE registration related to non-3GPP access is not deleted, the terminal accesses the 4G network through LTE and the terminal accesses the 5G network through non-3GPP access. In this scenario, since the terminal is not unregistered under the non-3GPP access, the terminal is still able to obtain the policy of the second network through the non-3GPP network, since the terminal policy association of the terminal is still maintained under the non-3GPP network. In this case, the terminal policy association may be established under the first network for the terminal, so as to ensure that the terminal policy association is provided under both the first network and the second network for the terminal, or the terminal policy association may not be established under the first network for the terminal, but only the terminal policy association under the second network is used for providing the policy for the terminal, or the terminal policy association under the first network may be triggered to be established, and then the terminal policy association under the non-3GPP network under the second network is released.
In the embodiment of the application, the terminal acquires the policy of the second network in the 4G network, and aims to synchronize the latest policy of the second network and/or use the policy of the second network in the first network. In some embodiments, the second network is a 5G network, the terminal obtains a policy urs of the second network, and uses, in the 4G network, a parameter mapped by the policy of the second network through a mapping relationship between policies of the 5G network and parameters of the 4G network, where the specific parameter may be a parameter in a related art, and in embodiments of the present application, the specific parameter is not limited.
In the embodiment of the present application, the policy of the second network refers to the policy of the terminal generated by the second network or generated by a network element belonging to the second network, regardless of whether the terminal uses the policy of the second network in the first network or the second network. For example, the second network is a 5G network, and the policy of the second network is a terminal policy such as urs p, V2XP, proSeP, ANDSP, etc. For another example, the second network is a 5G network, and the terminal may use the parameters of the second network after policy mapping in the 4G network through the mapping relationship between the policies and parameters of the 5G network and the 4G network, which is not limited in the embodiment of the present application.
It should be noted that the embodiment of the present application is also applicable to other Non-3GPP access methods to access the second network acquisition policy, and is not limited to N3IWF, for example, but is also applicable to Trusted Non-3GPP network (Trusted Non-3GPP Gateway Function,TNGF).
It should be noted that, the embodiment of the present application does not limit the manner in which the terminal accesses the N3IWF, for example, the terminal may access the N3IWF through WiFi, bluetooth, or other non-3GPP technologies, and then access the second network through the N3IWF.
Optionally, before the accessing the second network through the N3IWF, the method further includes:
the terminal determines the N3IWF based on pre-configuration information.
Alternatively, the terminal may first determine pre-configuration information for instructing the terminal how to select the non-3GPP interworking function N3IWF;
optionally, after determining the N3IWF based on the pre-configuration information, the terminal may perform a registration procedure of a second network based on non-3GPP through the N3IWF in case of accessing the first network through the LTE wireless system, and acquire a policy of the second network.
Optionally, after determining the N3IWF based on the preconfiguration information, the terminal may register the 5GS (the policy may be updated or not updated during access) through the N3IWF in a non-3GPP manner in the case of accessing the first network through the LTE wireless system, and then acquire the policy of the second network when updating the policy.
Alternatively, after determining the N3IWF based on the preconfiguration information, the terminal may obtain, through the N3IWF, the policy (real-time update policy) of the second network through a non-3 GPP manner in the case of accessing the first network through the LTE wireless system.
Optionally, before the accessing the second network through the N3IWF, the method further includes:
the terminal receives first information from the first network;
the terminal determines the N3IWF based on the first information.
Alternatively, the terminal may first acquire first information for instructing the terminal how to select the non-3 GPP interworking function N3IWF;
alternatively, the first information may be smf+pgw-C sent to the terminal;
alternatively, the first information may be sent to the terminal by the first network element;
alternatively, after determining the N3IWF based on the first information, the terminal may perform a registration procedure of a second network based on non-3 GPP through the N3IWF in case of accessing the first network through the LTE wireless system, and acquire a policy of the second network.
Optionally, after determining the N3IWF based on the first information, the terminal may register the 5GS (the policy may be updated or not updated during access) through the N3IWF in a non-3 GPP manner in case of accessing the first network through the LTE wireless system, and then acquire the policy of the second network when updating the policy.
Alternatively, after determining the N3IWF based on the first information, the terminal may obtain, through the N3IWF, the policy (real-time update policy) of the second network through a non-3 GPP manner in case of accessing the first network through the LTE wireless system.
Optionally, the first information may be contained in an extended protocol configuration option (extended Protocol Configuration Option, ePCO) and/or a protocol configuration option ProtocolConfiguration Options, PCO).
In an embodiment, the first network element may send the first information to the UE, where the first information is included in the ePCO, according to the terminal being in the first network.
In one embodiment, the first network element may send the first information to the UE included in the PCO according to the terminal being in the first network.
Optionally, the first information includes at least one of:
an N3IWF identifier (N3 IWF identifier);
fully qualified domain name (Fully Qualified Domain Name, FQDN);
an internet protocol address IP address (IP address);
an authentication means (authentication method);
a first indication information for indicating a public land mobile network PLMN priority list (a prioritized list of PLMNs for N3IWF selection.it also indicates if selection of an N3IWF in a PLMN should be based on Tracking Area Identity FQDN or on Operator Identifier FQDN) selected by the N3 IWF.
Optionally, the first indication information is further used to indicate a selection manner of the N3IWF in the PLMN priority list, where the selection manner includes:
the FQDN selection based on tracking area identity TAI, or the FQDN selection based on operator identity OI.
Optionally, before the accessing the second network through the N3IWF, the method further includes:
the terminal sends a first identifier to the first network, wherein the first identifier is used for indicating the first network to send the first information;
the first identifier is allocated by the second network or is mapped by the terminal identifier allocated by the second network.
Optionally, in a case that the terminal acquires the policy of the second network through the first network, and the terminal accesses the second network through the N3IWF to acquire the policy of the second network, the terminal acquires the policy of the second network based on at least one of the following:
priority information;
randomly selecting;
pre-configuration information.
It should be noted that, the terminal obtaining, through the first network, the policy of the second network refers to that the terminal obtains, through the first network or a network element belonging to the first network, the policy of the second network.
In some embodiments, the terminal always preferentially obtains the policy of the second network through the N3IWF access to the second network, and then obtains the policy of the second network through the first network, and then the priority information may be understood that the priority of the policy of the second network through the N3IWF access to the second network is higher than the priority of the policy of the second network through the first network. In other embodiments, the terminal selects, through the preconfiguration information, a policy of acquiring the second network through the N3IWF access second network, or a policy of acquiring the second network through the first network, or both.
In some embodiments, for a scenario in which 3GPP and non-3GPP access UEs are served by the same public land mobile network (Public Land Mobile Network, PLMN), if the terminal performs a handover procedure from 5GS to EPS with N26 interface, the following method may also be combined in case no registration information of UEs associated with non-3GPP access is removed by 5 GS:
one method is as follows: the PCF that serves the PDU session still discovers the address information of the PCF that serves the UE (PCF under the second network) by querying the binding support function (Binding Support Function, BSF) and establishes a terminal policy association with the PCF that serves the UE (UE policy association). After the terminal policy association is successfully established, there will be two terminal policy associations between the UE and the PCF serving the UE, one terminal policy association on EPS (UE policy association over EPS) and one terminal policy association on non-3GPP access (UE policy association over non-3GPP access). The PCF serving the UE will decide which terminal policy association to use to update the terminal's urs based on the network configuration or certain priority information. At this time, the PCF serving the UE will have a new network capability, where when the PCF serving the UE maintains two terminal policies associated to one terminal at the same time, the network element autonomously selects one of the policy associations to send the terminal policy (e.g., the policy of the second network);
The other method is as follows: if the terminal performs a handoff procedure from 5GS to EPS with an N26 interface, in the event that none of the registration information of the UE associated with the non-3GPP access is removed by 5GS, then the PCF serving the PDU session does not query the BSF to discover the address information of the PCF serving the UE (PCF under the second network), and the PCF serving the PDU session does not establish a terminal policy association with the PCF serving the UE (UE policy association). That is, the network side device does not establish a terminal policy association under the first network for the terminal at this time, and the terminal can only obtain the terminal policy through the terminal policy association reserved in the second network; if a terminal policy association is established under the EPS or LTE network for the terminal, at this time, in the case that the registration information of the UE associated with the non-3GPP access is removed by 5GS, there are two ways to trigger the policy association established under the EPS or LTE network. One implementation is that the PCF that is to trigger the serving PDU session establishes a terminal policy association under EPS to the PCF that is serving the UE before Non-3GPP de-registration. For example, the hss+udm informs the MME, the MME re-informs the smf+pgw-C, and the smf+pgw-C re-informs the PCF serving the PDU session, the PCF serving the PDU session first queries the address information of the PCF serving the UE from the BSF, and then the PCF serving the PDU session re-triggers the PCF setting up the terminal policy association to the PCF serving the UE. The terminal policy container is sent to the PCF that serves the PDU session, which may select one PCF that serves the UE from the NRF or query the address information of the PCF that serves the UE from the BSF first, and then the PCF that serves the PDU session triggers the PCF that establishes the terminal policy association to the PCF that serves the UE.
Still another method is that the PCF that serves the PDU session still discovers the address information of the PCF that serves the UE (PCF under the second network) by querying the BSF and establishes a terminal policy association (UE policy association) with the PCF that serves the UE. After the terminal policy association is successfully established, there will be two terminal policy associations between the UE and the PCF serving the UE, one terminal policy association on EPS (UE policy association over EPS) and one terminal policy association on non-3GPP access (UE policy association over non-3GPP access). But in order to guarantee that there is only one policy association for the serving terminal, then the PCF of the serving UE will decide which terminal policy association to use to update the terminal's urs according to the network configuration or certain priority information and then release the other terminal policy association. For example, the PCF serving the UE may send the terminal policy to the UE through two terminal policy associations at this time, and then, in order to ensure that the UE has only one terminal policy association, the PCF serving the UE may release the terminal policy association under the non-3GPP network, or the PCF serving the UE may release the terminal policy association under the LTE or EPS network, so as to ensure that only one terminal policy association serves the terminal, i.e., the PCF serving the UE performs a terminal policy association termination procedure, and terminates the terminal policy association under the first network or under the second network.
It should be noted that, typically, only one terminal remains with a terminal policy association to obtain the policy of the second network. However, in consideration that the terminal may obtain policies of different types of second networks through different access networks, in the present application, a plurality of terminal policy associations of the terminal may also be respectively maintained in a plurality of networks.
In this patent, releasing the terminal policy association may also be understood as terminating the terminal policy association.
Optionally, the method further comprises:
and after the terminal releases the connection of the second network accessed through the N3IWF, the terminal acquires the strategy of the second network through the terminal strategy association established by the first network.
It should be noted that, the terminal policy association is established by the first network, and is used for the terminal to acquire the policy of the second network in the first network.
Optionally, the terminal obtains the policy of the second network through the terminal policy association established by the first network, including:
the terminal carries a terminal policy container (UE Policy container) in a PDN connection establishment request or a PDN connection modification request, wherein the UE Policy container is used for the first network to establish the terminal policy association. In the embodiment of the application, under the condition that the terminal is accessed to the first network, the terminal can be accessed to the second network through the N3IWF to acquire the strategy of the second network, so that the consistent strategy between the first network and the second network can be ensured.
Fig. 3 is a second flowchart of a policy obtaining method according to an embodiment of the present application, as shown in fig. 3, where the method includes:
step 300, the first network element sends first information to the terminal through the second network element;
the first network element supports a protocol of a first network and supports a protocol of a second network, the second network element supports the protocol of the first network, the terminal accesses the first network through an LTE wireless system, and the first information is used for at least one of the following:
the terminal selects N3IWF, wherein the N3IWF is used for accessing the terminal into a second network;
the terminal accesses a second network through an N3IWF based on the first information.
Alternatively, the first network may be a 4G network;
alternatively, the second network may be a 5G network;
alternatively, the policy of the second network may be a urs rule;
alternatively, the access network over LTE radio may be an access to EPS/EPC over an evolved Universal terrestrial radio Access network (E-UTRAN), or an E-UTRAN access to 5GC.
Optionally, the first network element may be an smf+pgw-C node, i.e. a node where SMF and PGW-C functions are combined;
alternatively, the first network element may be an AMF;
optionally, the enhanced AMF may interact with the MME through an N26 interface, where the AMF is also the first network element supporting both the first network protocol and the second network protocol.
Optionally, the first network element may send first information to the terminal, the first information being used to instruct the terminal how to select the non-3 GPP interworking function N3IWF;
optionally, after determining the N3IWF based on the first information and/or the pre-configuration information, the terminal may perform a registration procedure of a second network based on non-3 GPP through the N3IWF under the condition of accessing the first network through the LTE wireless system, and acquire a policy of the second network.
In the embodiment of the application, the N3IWF is indicated by sending the first information to the terminal, so that the terminal can access the second network through the N3IWF under the condition that the terminal accesses the first network, thereby acquiring the strategy of the second network and ensuring that the strategy is consistent between the first network and the second network.
Optionally, the first network element sends the first information to the terminal through the second network element, including:
the first network element executes the operation of sending the first information to the terminal based on the second information;
the second information includes at least one of:
local configuration, second indication information about the terminal received from the second network element, or network information of the terminal.
In one embodiment, the second network element may acquire the first information based on the local configuration, and perform the operation of sending the first information to the terminal;
In one embodiment, before the first network element sends the first information to the terminal through the second network element, the first network element may receive second indication information about the terminal sent by the second network element, and may determine the first information based on the second indication information, and perform the operation of sending the first information to the terminal;
in one embodiment, the second network element may acquire the first information based on the network information of the terminal, and perform the operation of sending the first information to the terminal;
optionally, the first information includes at least one of:
an N3IWF identity, a fully qualified domain name FQDN, an internet protocol address IP address, an authentication means, or first indication information indicating a public land mobile network PLMN priority list selected by said N3 IWF.
Optionally, the first information is contained in an extended protocol configuration option (extended Protocol Configuration Option, ePCO) and/or a protocol configuration option ProtocolConfiguration Options, PCO).
In an embodiment, the first network element may send the first information to the UE, where the first information is included in the ePCO, according to the terminal being in the first network.
In one embodiment, the first network element may send the first information to the UE included in the PCO according to the terminal being in the first network.
In the embodiment of the application, the N3IWF is indicated by sending the first information to the terminal, so that the terminal can access the second network through the N3IWF under the condition that the terminal accesses the first network, thereby acquiring the strategy of the second network and ensuring that the strategy is consistent between the first network and the second network.
Fig. 4 is a third flowchart of a policy obtaining method according to an embodiment of the present application, as shown in fig. 4, where the method includes:
step 400, the second network element receives second information from the terminal;
step 410, the second network element sends second indication information to the first network element based on the second information;
the second indication information is used for the first network element to send first information to the terminal through the second network element, and the first information is used for at least one of the following:
the terminal selects N3IWF, wherein the N3IWF is used for accessing the terminal into a second network;
the terminal accesses a second network through an N3IWF based on the first information;
the first network element supports a first network protocol and supports a protocol of the second network, the second network element supports the protocol of the first network, and the terminal accesses the first network through an LTE wireless system.
Alternatively, the first network may be a 4G network;
alternatively, the second network may be a 5G network;
alternatively, the policy of the second network may be a urs rule;
alternatively, the access network over LTE radio may be an access to EPS/EPC over E-UTRAN or an access to 5GC over E-UTRAN.
Alternatively, the first network element may be an smf+pgw-C node;
alternatively, the first network element may be an AMF;
optionally, the enhanced AMF may interact with the MME through an N26 interface, where the AMF is also the first network element supporting both the first network protocol and the second network protocol.
Optionally, the second network element may receive second information from the terminal and send first indication information to the first network element, the first network element may determine the first information based on the first indication information, and the first network element may send the first information to the terminal, where the first information is used to instruct the terminal how to select the non-3 GPP interworking function N3IWF;
optionally, after determining the N3IWF based on the first information and/or the pre-configuration information, the terminal may perform a registration procedure of a second network based on non-3 GPP through the N3IWF under the condition of accessing the first network through the LTE wireless system, and acquire a policy of the second network.
In the embodiment of the application, the second indication information is provided for the first network element, so that the first network element sends the first information indication N3IWF to the terminal, and the terminal can access the second network through the N3IWF under the condition that the terminal accesses the first network, so that the strategy of the second network is obtained, and the consistent strategy between the first network and the second network is ensured.
Optionally, the second information includes a first identification;
the second network element sends second indication information to the first network element based on the second information, including:
the second network element sends the second indication information to the first network element based on the first identifier;
the first identifier is allocated to the second network or is obtained through terminal identifier mapping allocated by the second network.
Optionally, before the sending the second indication information to the first network element, the method further includes:
the second network element sends third indication information to a third network element, wherein the third indication information is used for indicating the third network element to indicate the related information of the first network element to the second network element.
In the embodiment of the application, the second indication information is provided for the first network element, so that the first network element sends the first information indication N3IWF to the terminal, and the terminal can access the second network through the N3IWF under the condition that the terminal accesses the first network, so that the strategy of the second network is obtained, and the consistent strategy between the first network and the second network is ensured.
In an alternative embodiment, fig. 5 is a flowchart of a policy obtaining method according to an embodiment of the present application, as shown in fig. 5, including the following steps:
step 1: the UE needs to use the urs in EPS to derive EPS parameters, such as the UE performing an initial attach procedure. The MME selects an SMF+PGW-C node supporting intersysteming based on the N1 capability of the UE;
wherein the UE needs to use the urs in EPS to derive EPS parameters. This may occur when the UE is performing an initial attach procedure, an interworking procedure from 5GS to EPS, or when the UE is to derive EPS parameters using a urs p (e.g. when performing a UE requested PDN connection).
The UE shall indicate its N1 mode capability and provide a native active 4G-GUTI or a 4G-GUTI mapped from a 5G GUTI (indicated as a native GUTI), if available, otherwise the IMSI will send an attach request message in its initial attach procedure.
The HSS selects an smf+pgw-C FQDN for an APN according to the policy of the operator. The MME may instruct the HSS to select smf+pgw-C FQDN based on the UE identity (e.g., 4G-GUTI mapped from 5G-GUTI).
Step 2 smf+pgw-C may send the first information (N3 IWF selection information) to the UE in ePCO during step 1 using an existing message (e.g. activate default EPS bearer context message, downlink NAS transport message). The N3IWF selection information contains the following information:
1) N3IWF identifier configuration (FQDN or IP address); and
2) The access node selection information includes a prioritized list of PLMNs for N3IWF selection, and an indication that selecting an N3IWF in a PLMN should be based on a tracking area identification, FQDN, or an operator identification, FQDN.
Step 3: when a default PDN connection is established, the UE performs registration through an untrusted non-3 GPP access. If the PCF decides to update the UE policy, it will trigger the UE policy association setup procedure during step 3.
Step 4: whenever the PCF needs to update the UE policy, it triggers the UE policy association modification through the N3 IWF.
In an alternative embodiment, fig. 6 is a fifth flowchart of a policy obtaining method according to an embodiment of the present application, as shown in fig. 6, including the following steps:
step 1: the UE needs to use the urs in EPS to derive EPS parameters, such as the UE performing an initial attach procedure. The MME selects an SMF+PGW-C node supporting intersysteming based on the N1 capability of the UE;
wherein the UE needs to use the urs in EPS to derive EPS parameters. This may occur when the UE is performing an initial attach procedure, an interworking procedure from 5GS to EPS, or when the UE is to derive EPS parameters using a urs p (e.g. when performing a UE requested PDN connection).
The UE shall indicate its N1 mode capability and provide a native active 4G-GUTI or a 4G-GUTI mapped from a 5G GUTI (indicated as a native GUTI), if available, otherwise the IMSI will send an attach request message in its initial attach procedure.
The HSS selects an smf+pgw-C FQDN for an APN according to the policy of the operator. The MME may instruct the HSS to select smf+pgw-C FQDN based on the UE identity (e.g., 4G-GUTI mapped from 5G-GUTI).
Step 2: the MME informs AMF that the UE needs to use URSP in EPS;
step 3, AMF sends first information (N3 IWF selection information) to UE. The N3IWF selection information contains the following information:
1) N3IWF identifier configuration (FQDN or IP address); and
2) The access node selection information includes a prioritized list of PLMNs for N3IWF selection, and an indication that selecting an N3IWF in a PLMN should be based on a tracking area identification, FQDN, or an operator identification, FQDN.
Step 4: when a default PDN connection is established, the UE performs registration through an untrusted non-3 GPP access. If the PCF decides to update the UE policy, it will trigger the UE policy association setup procedure during step 3.
Step 5: whenever the PCF needs to update the UE policy, it triggers the UE policy association modification through the N3 IWF.
According to the policy acquisition method provided by the embodiment of the application, the execution subject can be a policy acquisition device. In the embodiment of the application, a policy acquisition device executes a policy acquisition method as an example, and the policy acquisition device provided by the embodiment of the application is described.
Fig. 7 is a schematic structural diagram of a policy obtaining device according to an embodiment of the present application, as shown in fig. 7, the device 700 includes: a first acquisition module 710; wherein:
the first obtaining module 710 is configured to obtain, when accessing to a first network through an LTE wireless system, a policy of a second network through an N3IWF access to the second network.
In the embodiment of the application, under the condition that the terminal is accessed to the first network, the terminal can be accessed to the second network through the N3IWF to acquire the strategy of the second network, so that the consistent strategy between the first network and the second network can be ensured.
Optionally, the apparatus further comprises:
and the first determining module is used for determining the N3IWF based on the pre-configuration information before the second network is accessed through the N3IWF.
Optionally, the apparatus further comprises:
a second determining module, configured to receive first information from the first network before the accessing to the second network through the N3 IWF;
the N3IWF is determined based on the first information.
Optionally, the first information is contained in an extended protocol configuration option ePCO and/or a protocol configuration option PCO.
Optionally, the first information includes at least one of:
An N3IWF identification;
fully qualified domain name FQDN;
an internet protocol address IP address;
an identity verification mode;
and the first indication information is used for indicating the public land mobile network PLMN priority list selected by the N3 IWF.
Optionally, the first indication information is further used to indicate a selection manner of the N3IWF in the PLMN priority list, where the selection manner includes:
the FQDN selection based on tracking area identity TAI, or the FQDN selection based on operator identity OI.
Optionally, the apparatus further comprises:
a third sending module, configured to send, by the terminal, a first identifier to the first network before the second network is accessed through the N3IWF, where the first identifier is used to instruct the first network to send the first information;
the first identifier is allocated by the second network or is mapped by the terminal identifier allocated by the second network.
In the embodiment of the application, under the condition that the terminal is accessed to the first network, the terminal can be accessed to the second network through the N3IWF to acquire the strategy of the second network, so that the consistent strategy between the first network and the second network can be ensured.
The policy obtaining device in the embodiment of the application may be an electronic device, for example, an electronic device with an operating system, or may be a component in an electronic device, for example, an integrated circuit or a chip. The electronic device may be a terminal, or may be other devices than a terminal. By way of example, terminals may include, but are not limited to, the types of terminals 11 listed above, other devices may be servers, network attached storage (Network Attached Storage, NAS), etc., and embodiments of the application are not specifically limited.
The policy obtaining device provided by the embodiment of the present application can implement each process implemented by the embodiments of the methods of fig. 2, 5 and 6, and achieve the same technical effects, and for avoiding repetition, a detailed description is omitted here.
Fig. 8 is a second schematic structural diagram of a policy obtaining device according to an embodiment of the present application, as shown in fig. 8, the device 800 includes: a first transmitting module 810; wherein:
the first sending module 810 is configured to send the first information to the terminal through the second network element;
the first network element supports a protocol of a first network and supports a protocol of a second network, the second network element supports the protocol of the first network, the terminal accesses the first network through an LTE wireless system, and the first information is used for at least one of the following:
The terminal selects N3IWF, wherein the N3IWF is used for accessing the terminal into a second network;
the terminal accesses a second network through an N3IWF based on the first information.
In the embodiment of the application, the N3IWF is indicated by sending the first information to the terminal, so that the terminal can access the second network through the N3IWF under the condition that the terminal accesses the first network, thereby acquiring the strategy of the second network and ensuring that the strategy is consistent between the first network and the second network.
Optionally, the first sending module 810 is configured to:
the first network element executes the operation of sending the first information to the terminal based on the second information;
the second information includes at least one of:
local configuration, second indication information about the terminal received from the second network element, or network information of the terminal.
Optionally, the first information includes at least one of:
an N3IWF identity, a fully qualified domain name FQDN, an internet protocol address IP address, an authentication means, or first indication information indicating a public land mobile network PLMN priority list selected by said N3 IWF.
Optionally, the first information is contained in an extended protocol configuration option ePCO and/or a protocol configuration option PCO.
In the embodiment of the application, the N3IWF is indicated by sending the first information to the terminal, so that the terminal can access the second network through the N3IWF under the condition that the terminal accesses the first network, thereby acquiring the strategy of the second network and ensuring that the strategy is consistent between the first network and the second network.
The policy obtaining device in the embodiment of the application may be an electronic device, for example, an electronic device with an operating system, or may be a component in an electronic device, for example, an integrated circuit or a chip. The electronic device may be a terminal, or may be other devices than a terminal. By way of example, terminals may include, but are not limited to, the types of terminals 11 listed above, other devices may be servers, network attached storage (Network Attached Storage, NAS), etc., and embodiments of the application are not specifically limited.
The policy obtaining device provided by the embodiment of the present application can implement each process implemented by the embodiments of the methods of fig. 3, 5 and 6, and achieve the same technical effects, and for avoiding repetition, a detailed description is omitted here.
Fig. 9 is a third schematic structural diagram of a policy obtaining device according to an embodiment of the present application, as shown in fig. 9, the device 900 includes: a first receiving module 910, and a second transmitting module 920; wherein:
The first receiving module 910 is configured to receive second information from the terminal;
the second sending module 920 is configured to send second indication information to the first network element based on the second information;
the second indication information is used for the first network element to send first information to the terminal through the second network element, and the first information is used for at least one of the following:
the terminal selects N3IWF, wherein the N3IWF is used for accessing the terminal into a second network;
the terminal accesses a second network through an N3IWF based on the first information;
the first network element supports a first network protocol and supports a protocol of the second network, the second network element supports the protocol of the first network, and the terminal accesses the first network through an LTE wireless system.
In the embodiment of the application, the second indication information is provided for the first network element, so that the first network element sends the first information indication N3IWF to the terminal, and the terminal can access the second network through the N3IWF under the condition that the terminal accesses the first network, so that the strategy of the second network is obtained, and the consistent strategy between the first network and the second network is ensured.
Optionally, the second information includes a first identification;
The second sending module 920 is configured to:
the second network element sends the second indication information to the first network element based on the first identifier;
the first identifier is allocated to the second network or is obtained through terminal identifier mapping allocated by the second network.
Optionally, the apparatus further comprises:
a fourth sending module, configured to send, before the second instruction information is sent to the first network element, third instruction information to a third network element, where the third instruction information is used to instruct the third network element to instruct the second network element to indicate relevant information of the first network element.
In the embodiment of the application, the second indication information is provided for the first network element, so that the first network element sends the first information indication N3IWF to the terminal, and the terminal can access the second network through the N3IWF under the condition that the terminal accesses the first network, so that the strategy of the second network is obtained, and the consistent strategy between the first network and the second network is ensured.
The policy obtaining device in the embodiment of the application may be an electronic device, for example, an electronic device with an operating system, or may be a component in an electronic device, for example, an integrated circuit or a chip. The electronic device may be a terminal, or may be other devices than a terminal. By way of example, terminals may include, but are not limited to, the types of terminals 11 listed above, other devices may be servers, network attached storage (Network Attached Storage, NAS), etc., and embodiments of the application are not specifically limited.
The policy obtaining device provided by the embodiment of the present application can implement each process implemented by the embodiments of the methods of fig. 4 and fig. 5, and achieve the same technical effects, so that repetition is avoided, and no further description is provided herein.
Optionally, fig. 10 is a schematic structural diagram of a communication device provided in the embodiment of the present application, and as shown in fig. 10, the embodiment of the present application further provides a communication device 1000, including a processor 1001 and a memory 1002, where the memory 1002 stores a program or an instruction that can be run on the processor 1001, for example, when the communication device 1000 is a terminal, the program or the instruction is executed by the processor 1001 to implement each step of the policy obtaining method embodiment corresponding to the terminal, and the same technical effects can be achieved. When the communication device 1000 is a first network element, the program or the instruction is executed by the processor 1001 to implement the steps of the policy obtaining method embodiment corresponding to the first network element, and the same technical effects can be achieved, and when the communication device 1000 is a second network element, the program or the instruction is executed by the processor 1001 to implement the steps of the policy obtaining method embodiment corresponding to the second network element, and the same technical effects can be achieved, so that repetition is avoided and no further description is provided herein.
The embodiment of the application also provides a terminal, which comprises a processor and a communication interface, wherein the communication interface is used for:
and under the condition of accessing the first network through the LTE wireless system, accessing the second network through the N3IWF, and acquiring the strategy of the second network.
The terminal embodiment corresponds to the terminal-side method embodiment, and each implementation process and implementation manner of the method embodiment can be applied to the terminal embodiment, and the same technical effects can be achieved. Specifically, fig. 11 is a schematic diagram of a hardware structure of a terminal for implementing an embodiment of the present application.
The terminal 1100 includes, but is not limited to: at least part of the components of the radio frequency unit 1101, the network module 1102, the audio output unit 1103, the input unit 1104, the sensor 1105, the display unit 1106, the user input unit 1107, the interface unit 1108, the memory 1109, and the processor 1110, etc.
Those skilled in the art will appreciate that the terminal 1100 may further include a power source (e.g., a battery) for powering the various components, and that the power source may be logically coupled to the processor 1110 by a power management system so as to perform functions such as managing charging, discharging, and power consumption by the power management system. The terminal structure shown in fig. 11 does not constitute a limitation of the terminal, and the terminal may include more or less components than shown, or may combine some components, or may be arranged in different components, which will not be described in detail herein.
It should be appreciated that in embodiments of the present application, the input unit 1104 may include a graphics processing unit (Graphics Processing Unit, GPU) 11041 and a microphone 11042, the graphics processor 11041 processing image data of still pictures or video obtained by an image capturing device (e.g., a camera) in a video capturing mode or an image capturing mode. The display unit 1106 may include a display panel 11061, and the display panel 11061 may be configured in the form of a liquid crystal display, an organic light emitting diode, or the like. The user input unit 1107 includes at least one of a touch panel 11071 and other input devices 11072. The touch panel 11071 is also referred to as a touch screen. The touch panel 11071 may include two parts, a touch detection device and a touch controller. Other input devices 11072 may include, but are not limited to, a physical keyboard, function keys (e.g., volume control keys, switch keys, etc.), a trackball, a mouse, a joystick, and so forth, which are not described in detail herein.
In the embodiment of the present application, after receiving downlink data from the network side device, the radio frequency unit 1101 may transmit the downlink data to the processor 1110 for processing; in addition, the radio frequency unit 1101 may send uplink data to the network side device. Typically, the radio frequency unit 1101 includes, but is not limited to, an antenna, an amplifier, a transceiver, a coupler, a low noise amplifier, a duplexer, and the like.
Memory 1109 may be used to store software programs or instructions and various data. The memory 1109 may mainly include a first memory area storing programs or instructions and a second memory area storing data, wherein the first memory area may store an operating system, application programs or instructions (such as a sound playing function, an image playing function, etc.) required for at least one function, and the like. Further, the memory 1109 may include volatile memory or nonvolatile memory, or the memory 1109 may include both volatile and nonvolatile memory. The nonvolatile Memory may be a Read-Only Memory (ROM), a Programmable ROM (PROM), an Erasable PROM (EPROM), an Electrically Erasable EPROM (EEPROM), or a flash Memory. The volatile memory may be random access memory (Random Access Memory, RAM), static RAM (SRAM), dynamic RAM (DRAM), synchronous DRAM (SDRAM), double Data Rate SDRAM (ddr SDRAM), enhanced SDRAM (Enhanced SDRAM), synchronous DRAM (SLDRAM), and Direct RAM (DRRAM). Memory 1109 in embodiments of the present application includes, but is not limited to, these and any other suitable types of memory.
Processor 1110 may include one or more processing units; optionally, the processor 1110 integrates an application processor that primarily processes operations involving an operating system, user interface, application programs, and the like, and a modem processor that primarily processes wireless communication signals, such as a baseband processor. It will be appreciated that the modem processor described above may not be integrated into the processor 1110.
Wherein the processor 1110 is configured to:
and under the condition of accessing the first network through the LTE wireless system, accessing the second network through the N3IWF, and acquiring the strategy of the second network.
In the embodiment of the application, under the condition that the terminal is accessed to the first network, the terminal can be accessed to the second network through the N3IWF to acquire the strategy of the second network, so that the consistent strategy between the first network and the second network can be ensured.
Optionally, the processor 1110 is configured to:
before the access to the second network through the N3IWF, determining the N3IWF based on pre-configuration information.
Optionally, the processor 1110 is configured to:
receiving first information from the first network before the accessing the second network through the N3 IWF;
The N3IWF is determined based on the first information.
Optionally, the first information is contained in an extended protocol configuration option ePCO and/or a protocol configuration option PCO.
Optionally, the first information includes at least one of:
an N3IWF identification;
fully qualified domain name FQDN;
an internet protocol address IP address;
an identity verification mode;
and the first indication information is used for indicating the public land mobile network PLMN priority list selected by the N3IWF.
Optionally, the first indication information is further used to indicate a selection manner of the N3IWF in the PLMN priority list, where the selection manner includes:
the FQDN selection based on tracking area identity TAI, or the FQDN selection based on operator identity OI.
Optionally, before the accessing the second network through the N3IWF, the processor 1110 is configured to:
the terminal sends a first identifier to the first network, wherein the first identifier is used for indicating the first network to send the first information;
the first identifier is allocated by the second network or is mapped by the terminal identifier allocated by the second network.
In the embodiment of the application, under the condition that the terminal is accessed to the first network, the terminal can be accessed to the second network through the N3IWF to acquire the strategy of the second network, so that the consistent strategy between the first network and the second network can be ensured.
The embodiment of the application also provides a first network element, which comprises a processor and a communication interface, wherein the communication interface is used for:
sending the first information to the terminal through the second network element;
the first network element supports a protocol of a first network and supports a protocol of a second network, the second network element supports the protocol of the first network, the terminal accesses the first network through an LTE wireless system, and the first information is used for at least one of the following:
selecting an N3IWF, wherein the N3IWF is used for the terminal to access a second network;
and accessing a second network through the N3IWF based on the first information.
Fig. 12 is a schematic hardware structure of a first network element implementing an embodiment of the present application, as shown in fig. 12, the first network element 1200 includes: a processor 1201, a network interface 1202, and a memory 1203. The network interface 1202 is, for example, a common public radio interface (common public radio interface, CPRI).
Specifically, the first network element 1200 of the embodiment of the present application further includes: instructions or programs stored in the memory 1203 and capable of being executed by the processor 1201, the processor 1201 calls the instructions or programs in the memory 1203 to execute the method executed by each module shown in fig. 8, and achieve the same technical effects, so that repetition is avoided and thus a detailed description is omitted.
The embodiment of the application also provides a second network element, which comprises a processor and a communication interface, wherein the communication interface is used for:
receiving second information from the terminal;
based on the second information, sending second indication information to the first network element;
the second indication information is used for the first network element to send first information to the terminal through the second network element, and the first information is used for at least one of the following:
the terminal selects N3IWF, wherein the N3IWF is used for accessing the terminal into a second network;
the terminal accesses a second network through an N3IWF based on the first information;
the first network element supports a first network protocol and supports a protocol of the second network, the second network element supports the protocol of the first network, and the terminal accesses the first network through an LTE wireless system.
Fig. 13 is a schematic hardware structure of a second network element for implementing an embodiment of the present application, as shown in fig. 13, where the network side device 1300 includes: processor 1301, network interface 1302, and memory 1303. The network interface 1302 is, for example, a common public radio interface (common public radio interface, CPRI).
Specifically, the network side device 1300 according to the embodiment of the present application further includes: instructions or programs stored in the memory 1303 and capable of running on the processor 1301, the processor 1301 calls the instructions or programs in the memory 1303 to execute the method executed by each module shown in fig. 8, and achieve the same technical effects, so repetition is avoided and will not be described herein.
The embodiment of the application also provides a readable storage medium, on which a program or an instruction is stored, which when executed by a processor, implements each process of the above embodiment of the policy obtaining method, and can achieve the same technical effects, and in order to avoid repetition, the description is omitted here.
Wherein the processor is a processor in the terminal described in the above embodiment. The readable storage medium includes computer readable storage medium such as computer readable memory ROM, random access memory RAM, magnetic or optical disk, etc.
The embodiment of the application further provides a chip, which comprises a processor and a communication interface, wherein the communication interface is coupled with the processor, and the processor is used for running programs or instructions to realize the processes of the above strategy acquisition method embodiment, and can achieve the same technical effects, so that repetition is avoided, and the description is omitted here.
It should be understood that the chips referred to in the embodiments of the present application may also be referred to as system-on-chip chips, or the like.
The embodiments of the present application further provide a computer program/program product, where the computer program/program product is stored in a storage medium, and the computer program/program product is executed by at least one processor to implement each process of the above-mentioned policy obtaining method embodiment, and the same technical effects can be achieved, so that repetition is avoided, and details are not repeated herein.
The embodiment of the application also provides a strategy acquisition system, which comprises the following steps: the terminal can be used for executing the steps of the policy acquisition method corresponding to the terminal, the first network element can be used for executing the steps of the policy acquisition method corresponding to the first network element, and the second network element can be used for executing the steps of the policy acquisition method corresponding to the second network element.
It should be noted that, in this document, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising one … …" does not exclude the presence of other like elements in a process, method, article, or apparatus that comprises the element. Furthermore, it should be noted that the scope of the methods and apparatus in the embodiments of the present application is not limited to performing the functions in the order shown or discussed, but may also include performing the functions in a substantially simultaneous manner or in an opposite order depending on the functions involved, e.g., the described methods may be performed in an order different from that described, and various steps may be added, omitted, or combined. Additionally, features described with reference to certain examples may be combined in other examples.
From the above description of the embodiments, it will be clear to those skilled in the art that the above-described embodiment method may be implemented by means of software plus a necessary general hardware platform, but of course may also be implemented by means of hardware, but in many cases the former is a preferred embodiment. Based on such understanding, the technical solution of the present application may be embodied essentially or in a part contributing to the prior art in the form of a computer software product stored in a storage medium (e.g. ROM/RAM, magnetic disk, optical disk) comprising instructions for causing a terminal (which may be a mobile phone, a computer, a server, an air conditioner, or a network device, etc.) to perform the method according to the embodiments of the present application.
The embodiments of the present application have been described above with reference to the accompanying drawings, but the present application is not limited to the above-described embodiments, which are merely illustrative and not restrictive, and many forms may be made by those having ordinary skill in the art without departing from the spirit of the present application and the scope of the claims, which are to be protected by the present application.

Claims (24)

1. A policy acquisition method, comprising:
and under the condition that the terminal accesses the first network through a Long Term Evolution (LTE) wireless system, accessing a second network through a non-3 GPP interworking function (N3 IWF) to acquire a strategy of the second network.
2. The policy acquisition method according to claim 1, wherein prior to said accessing the second network through the N3IWF, the method further comprises:
the terminal determines the N3IWF based on pre-configuration information.
3. The policy acquisition method according to claim 1, wherein prior to said accessing the second network through the N3IWF, the method further comprises:
the terminal receives first information from the first network;
the terminal determines the N3IWF based on the first information.
4. A policy acquisition method according to claim 3, characterized in that said first information is contained in an extended protocol configuration option ePCO and/or a protocol configuration option PCO.
5. The policy acquisition method according to claim 3 or 4, wherein the first information comprises at least one of:
an N3IWF identification;
fully qualified domain name FQDN;
an internet protocol address IP address;
An identity verification mode;
and the first indication information is used for indicating the public land mobile network PLMN priority list selected by the N3 IWF.
6. The policy acquisition method according to claim 5, wherein the first indication information is further used to indicate a selection manner of the N3IWF in the PLMN priority list, the selection manner including:
the FQDN selection based on tracking area identity TAI, or the FQDN selection based on operator identity OI.
7. The policy acquisition method according to claim 3, wherein before said accessing the second network through the N3IWF, the method further comprises:
the terminal sends a first identifier to the first network, wherein the first identifier is used for indicating the first network to send the first information;
the first identifier is allocated by the second network or is mapped by the terminal identifier allocated by the second network.
8. The policy acquisition method according to claim 1, wherein in the case where the terminal acquires the policy of the second network through the first network and the terminal acquires the policy of the second network through an N3IWF access second network, the terminal acquires the policy of the second network based on at least one of:
Priority information;
randomly selecting;
pre-configuration information.
9. The policy acquisition method according to claim 1, wherein the method further comprises:
and after the terminal releases the connection of the second network accessed through the N3IWF, the terminal acquires the strategy of the second network through the terminal strategy association established by the first network.
10. The method of claim 9, wherein the obtaining, by the terminal, the policy of the second network through the terminal policy association established by the first network after the terminal releases the connection to the second network through the N3IWF, comprises:
after the terminal releases the connection accessing the second network through the N3IWF, the terminal carries a terminal policy container UE Policy container in a PDN connection establishment request or a PDN connection modification request;
wherein the UE Policy container is used for the first network to establish the terminal policy association.
11. A policy acquisition method, comprising:
the first network element sends first information to the terminal through the second network element;
the first network element supports a protocol of a first network and supports a protocol of a second network, the second network element supports the protocol of the first network, the terminal accesses the first network through an LTE wireless system, and the first information is used for at least one of the following:
The terminal selects N3IWF, wherein the N3IWF is used for accessing the terminal into a second network;
the terminal accesses a second network through an N3IWF based on the first information.
12. The policy acquisition method according to claim 11, wherein the first network element sends the first information to the terminal through the second network element, comprising:
the first network element executes the operation of sending the first information to the terminal based on the second information;
the second information includes at least one of:
local configuration, second indication information about the terminal received from the second network element, or network information of the terminal.
13. The policy acquisition method according to claim 11 or 12, wherein said first information comprises at least one of:
an N3IWF identity, a fully qualified domain name FQDN, an internet protocol address IP address, an authentication means, or first indication information indicating a public land mobile network PLMN priority list selected by said N3 IWF.
14. A policy acquisition method according to any of claims 11-13, wherein said first information is comprised in an extended protocol configuration option ePCO and/or a protocol configuration option PCO.
15. A policy acquisition method, comprising:
the second network element receives second information from the terminal;
the second network element sends second indication information to the first network element based on the second information;
the second indication information is used for the first network element to send first information to the terminal through the second network element, and the first information is used for at least one of the following:
the terminal selects N3IWF, wherein the N3IWF is used for accessing the terminal into a second network;
the terminal accesses a second network through an N3IWF based on the first information;
the first network element supports a first network protocol and supports a protocol of the second network, the second network element supports the protocol of the first network, and the terminal accesses the first network through an LTE wireless system.
16. The policy acquisition method according to claim 15, wherein said second information comprises a first identification;
the second network element sends second indication information to the first network element based on the second information, including:
the second network element sends the second indication information to the first network element based on the first identifier;
the first identifier is allocated to the second network or is obtained through terminal identifier mapping allocated by the second network.
17. The policy acquisition method according to claim 15, wherein before said sending the second indication information to the first network element, the method further comprises:
the second network element sends third indication information to a third network element, wherein the third indication information is used for indicating the third network element to indicate the related information of the first network element to the second network element.
18. A policy acquisition device, comprising:
the first acquisition module is used for accessing a second network through an N3IWF under the condition of accessing the first network through an LTE wireless system, and acquiring a strategy of the second network.
19. A policy acquisition device, comprising:
the first sending module is used for sending the first information to the terminal through the second network element;
the first network element supports a protocol of a first network and supports a protocol of a second network, the second network element supports the protocol of the first network, the terminal accesses the first network through an LTE wireless system, and the first information is used for at least one of the following:
the terminal selects N3IWF, wherein the N3IWF is used for accessing the terminal into a second network;
the terminal accesses a second network through an N3IWF based on the first information.
20. A policy acquisition device, comprising:
the first receiving module is used for receiving second information from the terminal;
the second sending module is used for sending second indication information to the first network element based on the second information;
the second indication information is used for the first network element to send first information to the terminal through the second network element, and the first information is used for at least one of the following:
the terminal selects N3IWF, wherein the N3IWF is used for accessing the terminal into a second network;
the terminal accesses a second network through an N3IWF based on the first information;
the first network element supports a first network protocol and supports a protocol of the second network, the second network element supports the protocol of the first network, and the terminal accesses the first network through an LTE wireless system.
21. A terminal comprising a processor and a memory storing a program or instructions executable on the processor, which when executed by the processor implements the policy acquisition method of any one of claims 1 to 10.
22. A first network element comprising a processor and a memory storing a program or instruction executable on the processor, which when executed by the processor implements a policy acquisition method as claimed in any one of claims 11 to 14.
23. A second network element comprising a processor and a memory storing a program or instructions executable on the processor, which when executed by the processor implements the policy acquisition method of any one of claims 15 to 17.
24. A readable storage medium, characterized in that the readable storage medium has stored thereon a program or instructions, which when executed by a processor, implements the policy acquisition method according to any one of claims 1 to 10, or implements the policy acquisition method according to any one of claims 11 to 14, or implements the policy acquisition method according to any one of claims 15 to 17.
CN202310374161.6A 2022-05-05 2023-04-07 Policy acquisition method and device Pending CN117015002A (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN202210483996 2022-05-05
CN2022104839960 2022-05-05

Publications (1)

Publication Number Publication Date
CN117015002A true CN117015002A (en) 2023-11-07

Family

ID=88560729

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202310374161.6A Pending CN117015002A (en) 2022-05-05 2023-04-07 Policy acquisition method and device

Country Status (1)

Country Link
CN (1) CN117015002A (en)

Similar Documents

Publication Publication Date Title
CN110493771B (en) Data network connection method, device, storage medium and terminal equipment
WO2023143422A1 (en) Disaster roaming control method and apparatus, terminal, and network side device
CN117479113A (en) Interaction method, device, equipment and storage medium
CN116567626A (en) Equipment authentication method and device and communication equipment
CN117015002A (en) Policy acquisition method and device
WO2023143423A1 (en) Information acquisition, storage and reporting method and device, terminal, and network function
WO2023179595A1 (en) Session channel establishment method and apparatus for non-3gpp device, and device
WO2023213236A1 (en) Policy configuration method and device
CN116828546A (en) Session channel establishment method, device and equipment of non-3 GPP equipment
CN116939759A (en) Routing processing method, terminal and network side equipment
CN117676725A (en) Communication method, device, terminal and core network node
CN117640578A (en) DNS query method and communication equipment
CN116567709A (en) Equipment identifier distribution method, device, network function and storage medium
CN117500010A (en) Calling method, device and terminal
CN118055394A (en) Information transmission method, apparatus, communication device and readable storage medium
CN118175530A (en) Communication method, terminal and core network function
CN117294679A (en) IMS service acquisition method, terminal, network equipment and medium
CN117641513A (en) Communication method, device and readable storage medium
CN116867020A (en) Terminal route selection policy URSP determining method, terminal and network equipment
CN117715234A (en) Data channel establishment method, first terminal and second terminal
CN118175529A (en) Communication method, terminal and core network function
CN117412283A (en) Information processing method, apparatus, communication device, and readable storage medium
CN116567591A (en) Direct connection air interface configuration method, terminal and network side equipment
CN117528831A (en) Information acquisition and transmission method, server access and session establishment method and equipment
CN117241230A (en) IMS service acquisition method, terminal and network equipment

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination