CN117793737A - User terminal strategy configuration method, device, medium and chip - Google Patents

User terminal strategy configuration method, device, medium and chip Download PDF

Info

Publication number
CN117793737A
CN117793737A CN202211193867.4A CN202211193867A CN117793737A CN 117793737 A CN117793737 A CN 117793737A CN 202211193867 A CN202211193867 A CN 202211193867A CN 117793737 A CN117793737 A CN 117793737A
Authority
CN
China
Prior art keywords
user terminal
policy
container
amf
strategy
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202211193867.4A
Other languages
Chinese (zh)
Inventor
孙悦
陈卓怡
龙彪
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
China Telecom Corp Ltd
Original Assignee
China Telecom Corp Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by China Telecom Corp Ltd filed Critical China Telecom Corp Ltd
Priority to CN202211193867.4A priority Critical patent/CN117793737A/en
Priority to PCT/CN2023/116590 priority patent/WO2024066924A1/en
Publication of CN117793737A publication Critical patent/CN117793737A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W24/00Supervisory, monitoring or testing arrangements
    • H04W24/02Arrangements for optimising operational condition
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W72/00Local resource management
    • H04W72/50Allocation or scheduling criteria for wireless resources
    • H04W72/53Allocation or scheduling criteria for wireless resources based on regulatory allocation policies
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W8/00Network data management
    • H04W8/18Processing of user or subscriber data, e.g. subscribed services, user preferences or user profiles; Transfer of user or subscriber data
    • H04W8/20Transfer of user or subscriber data

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Databases & Information Systems (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The embodiment of the disclosure provides a method, a device, a medium and a chip for configuring a user terminal strategy, and relates to the technical field of communication. The method comprises the following steps: the first access and mobility management function AMF receives information of the user terminal sent by the second AMF; when the information of the user terminal does not comprise a strategy container, the first AMF sends a request for providing the strategy container to the user terminal; the first AMF receives a policy container sent by a user terminal; the first AMF sends the policy container to the first policy control function PCF to cause the first PCF to configure the policy of the user terminal according to the policy container. The embodiment of the disclosure can realize the strategy of configuring the user terminal during AMF redirection.

Description

User terminal strategy configuration method, device, medium and chip
Technical Field
The present disclosure relates to the field of mobile communications, and in particular, to a method, an apparatus, a computer readable storage medium, and a chip for configuring a user terminal policy.
Background
In the prior art, there is a situation of policy control function PCF reselection during access and mobility management function AMF redirection. In this scenario, the new AMF may reinitiate the UE policy association establishment procedure of the UE, and in this process, the new AMF may not send the UE policy container information to the new PCF, and then the new PCF may consider the UE to be newly initially registered, and the new PCF may newly create all UE policies.
Disclosure of Invention
The embodiment of the disclosure provides a method, a device, a medium and a chip for configuring a user terminal policy, which can realize the policy for configuring the user terminal during AMF redirection.
The embodiment of the disclosure provides a method for configuring a user terminal policy, which comprises the following steps: the first access and mobility management function AMF receives information of the user terminal sent by the second AMF; when the information of the user terminal does not comprise a strategy container, the first AMF sends a request for providing the strategy container to the user terminal; the first AMF receives a policy container sent by a user terminal; the first AMF sends the policy container to the first policy control function PCF to cause the first PCF to configure the policy of the user terminal according to the policy container.
In one embodiment, the method further comprises: and the first AMF judges whether the information of the user terminal comprises a policy container or not.
In one embodiment, the method further comprises: when the first AMF includes a policy container in the information of the user terminal, the policy container is sent to the first PCF, so that the first PCF configures the policy of the user terminal according to the policy container.
In one embodiment, the policy container includes a list of policy segment identities, an operating system identity, and an indication of access network service discovery and selection policies supported by the user terminal.
In one embodiment, causing the first PCF to configure the policy of the user terminal according to the policy container comprises: the first AMF receives the strategy of the user terminal configured by the first PCF according to the strategy container; the first AMF transmits the policy of the user terminal to the user terminal so that the user terminal updates the policy configuration.
In one embodiment, causing the first PCF to configure the policy of the user terminal according to the policy container comprises: the first PCF configures an access network service discovery and selection policy or a user terminal routing policy of the user terminal according to the policy container.
In one embodiment, causing the first PCF to configure the policy of the user terminal according to the policy container comprises: the first PCF is enabled to configure the policy of the user terminal according to the policy container and the local policy of the first PCF.
The embodiment of the disclosure provides a communication device, which comprises a processing module and a transceiver module, and is used for realizing the method of any one of the above embodiments.
The disclosed embodiments provide a communication device including: a processor coupled to a memory for storing a program or instructions that, when executed by the processor, cause the apparatus to perform the method of any of the above embodiments.
The disclosed embodiments provide a computer-readable storage medium having stored thereon a computer program or instructions which, when executed, cause a computer to perform the method of any of the above embodiments.
Embodiments of the present disclosure provide a chip comprising a processor coupled with a memory for storing a program or instructions that, when executed by the processor, cause an apparatus to perform the method of any one of the embodiments above.
According to the configuration method of the user terminal strategy, the information of the user terminal sent by the second AMF is received through the first access and mobility management function AMF; the first AMF judges whether the information of the user terminal comprises a strategy container or not; when the information of the user terminal does not comprise a strategy container, the first AMF sends a request for providing the strategy container to the user terminal; the first AMF receives a policy container sent by a user terminal; the first AMF sends the policy container to the first policy control function PCF, so that the first PCF configures the policy of the user terminal according to the policy container, and may implement configuring the policy of the user terminal during the redirection of the AMF.
Drawings
In order to more clearly illustrate the embodiments of the present disclosure or the technical solutions in the prior art, the drawings that are required in the embodiments or the description of the prior art will be briefly described below, and it is obvious that the drawings in the following description are only some embodiments of the present disclosure, and other drawings may be obtained according to these drawings without inventive effort to a person of ordinary skill in the art.
FIG. 1 illustrates a network architecture schematic of a communication system of one embodiment;
FIG. 2 illustrates a flow chart of a method of configuring a user terminal policy of one embodiment of the present disclosure;
FIG. 3 illustrates an example diagram of a method of configuring a user terminal policy of one embodiment of the present disclosure;
fig. 4 shows a schematic structural diagram of a communication apparatus of an embodiment of the present disclosure;
fig. 5 shows a schematic structural diagram of a communication apparatus according to an embodiment of the present disclosure.
Detailed Description
The following description of the technical solutions in the embodiments of the present disclosure will be made clearly and completely with reference to the accompanying drawings in the embodiments of the present disclosure, and it is apparent that the described embodiments are only some embodiments of the present disclosure, not all embodiments. All other embodiments, which can be made by one of ordinary skill in the art without inventive effort, based on the embodiments in this disclosure are intended to be within the scope of this disclosure.
In the embodiment of the present disclosure, the information of the user terminal transmitted by the second AMF may be received through the first access and mobility management function AMF (access and mobility management function, AMF) based on a communication system, for example, a fifth generation (5G) system; the first AMF judges whether the information of the user terminal comprises a strategy container or not; when the information of the user terminal does not comprise a strategy container, the first AMF sends a request for providing the strategy container to the user terminal; the first AMF receives a policy container sent by a user terminal; the first AMF sends the policy container to the first policy control function PCF to enable the first PCF to configure the policy of the user terminal according to the policy container, so that the policy of the user terminal is configured during the redirection of the AMF.
The communication system may include, among other things, a terminal device 110, an access network 120, and a core network 130. For example, reference may be made to the network architecture schematic of the communication system shown in fig. 1.
The terminal device 110 is a device with a wireless transceiver function, and may be deployed on land, including indoor or outdoor, hand-held, wearable or vehicle-mounted; can also be deployed on the water surface (such as ships, etc.); but may also be deployed in the air (e.g., on aircraft, balloon, satellite, etc.). The terminal device may be a mobile phone (mobile phone), a tablet (Pad), a computer with a wireless transceiving function, a Virtual Reality (VR) terminal device, an augmented reality (augmented reality, AR) terminal device, a wireless terminal in industrial control (industrial control), a vehicle-mounted terminal device, a wireless terminal in unmanned driving (self driving), a wireless terminal in remote medical (remote medical), a wireless terminal in smart grid (smart grid), a wireless terminal in transportation security (transportation safety), a wireless terminal in smart city (smart city), a wireless terminal in smart home (smart home), a wearable terminal device, or the like. The terminal device may also be sometimes referred to as a terminal, user Equipment (UE), access terminal device, vehicle-mounted terminal, industrial control terminal, UE unit, UE station, mobile station, remote terminal device, mobile device, UE agent, UE apparatus, or the like. The terminal device may also be fixed or mobile. Fig. 1 and the terminal device 110 in the present application are described by taking UE as an example.
Access network 120 is configured to implement access-related functions, and may provide access functions for authorized users in a particular area. The access network forwards control signals and user data between the terminal device and the core network. The access network may include access network devices, which may be devices providing access to terminal devices, and may include radio access network (radio access network, RAN) devices and AN devices. The RAN device is mainly a wireless network device in a 3GPP (3 rd Generation Partnership Project, third generation partnership project) network, and the AN device may be a non-3 GPP defined access network device. In systems employing different radio access technologies, the names of base station capable devices may vary, for example, in 5G systems, referred to as RAN or next-generation base stations (next-generation Node basestation, gNB); in a long term evolution (long termevolution, LTE) system, it is called evolved NodeB, eNB or eNodeB.
The core network 130 is responsible for maintaining subscription data of the mobile network, and providing session management, mobility management, policy management, security authentication, and other functions for the UE 110. The core network 130 may include the following network elements (modules): user plane functions 131 (user plane function, UPF), authentication service functions 132 (authentication server function, AUSF), access and mobility management functions 133 (access and mobility management function, AMF), session management functions 134 (session management function, SMF), network opening functions 135 (network exposure function, NEF), network function warehousing functions 136 (network function repository function, NRF), policy control functions 137 (policy control function, PCF) and unified data management 1381 (unified data management, UDM), optionally, application functions 139 (application function, AF) and unified data store 1382 (Unified Data Repository, UDR). In the present embodiment, UDM1381 and UDR1382 are collectively referred to as data management network element 138.
In the core network, the AMF133 is mainly responsible for mobility management in the mobile network, such as user location update, user registration network, user handover, etc. The SMF134 is mainly responsible for session management in the mobile network, e.g. session establishment, modification, release. UPF131, which is responsible for forwarding and receiving user data in terminal equipment, can receive user data from a data network and transmit the user data to the terminal equipment through access network equipment; user data may also be received from the terminal device via the access network device and forwarded to the data network. PCF137 is primarily responsible for providing a unified policy framework to control network behavior, providing policy rules to control layer network functions, and also for obtaining subscriber subscription information related to policy decisions. AUSF132 for performing security authentication of UE 110. NEF136 is primarily used to support the opening of capabilities and events. NRF137 for providing a storage function and a selection function of network function entity information for other network elements. UDM1381 for storing subscriber data such as subscription data, authentication/authorization data, etc. The AF139 interacts with the 3GPP core network 130 for providing application layer services, e.g. providing data routing in respect of the application layer, providing access network capability opening functionality, interacting with policy frameworks to provide policy control, interacting with IP multimedia subsystems (IP multimedia subsystem, IMS) of the communication network, etc.
The data network 140 (DN) is used to provide a business service for a user, and may be a private network, such as a local area network; or an external network not under the control of an operator, such as the Internet (Internet); but also a proprietary network co-deployed by operators, such as the network of IMS. The terminal device may access DN140 through an established protocol data unit (protocol data unit, PDU) session.
Wherein, the AMF redirection refers to that when one AMF (e.g., the second AMF) receives a registration request, the AMF may need to redirect the registration request to another AMF (e.g., the first AMF), and the primary application scenario, the initial AMF is not suitable for providing services to the UE. In the existing communication standard, no special process is established for the UE policy association of PCF reselection during AMF redirection at present.
Fig. 2 shows a flowchart of a method of configuring a user terminal policy according to one embodiment of the present disclosure.
Referring to fig. 2, in this embodiment, the method for configuring the user terminal policy includes:
in step 210, the first access and mobility management function AMF receives information of the user terminal transmitted by the second AMF.
In this step, the first AMF may be a new AMF at the time of redirection and the second AMF may be an old AMF at the time of redirection. When the second AMF is not suitable for providing the service for the user terminal, the second AMF redirects the service request of the user terminal to the first AMF.
In step 220, the first AMF sends a request to the user terminal to provide the policy container when the policy container is not included in the information of the user terminal.
In this step, the first AMF transmits a request for providing a policy container to the user terminal when the policy container is not included in the information of the user terminal. In one embodiment, a first AMF sends a request to provide a policy container to a UE over an N1 interface (NAS). Wherein the Policy container comprises a list of Policy segment identities (the list of stored PSIs), wherein PSI represents Policy section identifier, the Policy segment identities), an operating system identity (OSID, operating system identifier) and an indication of access network service discovery and Selection policies supported by the user terminal (indication of UE support for ANDSP), wherein the ANDSP represents access network service discovery and Selection policies (Access Network Discovery & Selection Policy).
In step 230, the first AMF receives a policy container sent by the user terminal.
In this step, the first AMF receives the policy container sent by the user terminal.
In step 240, the first AMF sends the policy container to the first policy control function PCF to cause the first PCF to configure the policy of the user terminal according to the policy container.
In this step, the first AMF sends the policy container to the first policy control function PCF to cause the first PCF to configure the policy of the user terminal according to the policy container. In one embodiment, a first AMF receives a policy of a user terminal configured by a first PCF according to a policy container; the first AMF transmits the policy of the user terminal to the user terminal so that the user terminal updates the policy configuration.
In one embodiment, the first PCF is caused to configure an access network service discovery and selection policy (ANDSP) or a user terminal routing policy (urs p, UE Route Selection Polic) of the user terminal according to the policy container. In current 5G networks, policy control (i.e., UE policy) related to UE access selection and PDU (protocol data unit ) session selection allows the network (e.g., PCF) to configure two types of operator policies for the UE: (1) Access network discovery and policy selection (ANDSP) for non-3 GPP access; (2) UE routing policies (urs) related to applications and PDU sessions. The UE will follow the network provided ANDSP or urs rules. In one embodiment, the first PCF is caused to configure the policy of the user terminal according to the policy container and the local policy of the first PCF.
In one embodiment, the configuration method of the user terminal policy shown in fig. 2 further includes: the first AMF determines whether the information of the user terminal includes a policy container.
In one embodiment, the configuration method of the user terminal policy shown in fig. 2 further includes: when the first AMF includes a policy container in the information of the user terminal, the policy container is sent to the first PCF, so that the first PCF configures the policy of the user terminal according to the policy container.
The configuration method of the user terminal policy shown in fig. 2 receives, through a first access and mobility management function AMF, information of the user terminal sent by a second AMF; when the information of the user terminal does not comprise a strategy container, the first AMF sends a request for providing the strategy container to the user terminal; the first AMF receives a policy container sent by a user terminal; the first AMF sends the policy container to the first policy control function PCF, so that the first PCF configures the policy of the user terminal according to the policy container, and may implement configuring the policy of the user terminal during the redirection of the AMF.
Fig. 3 shows an exemplary diagram of a method of configuring a user terminal policy according to one embodiment of the present disclosure. The method of fig. 2 is described below in connection with the specific example of fig. 3:
referring to fig. 3, in step S301, a user terminal UE sends an access request or a session establishment request to a base station RAN side, and sends the access request or the session establishment request to a second AMF through the RAN.
Referring to fig. 3, in step S302, the second AMF determines that it is not suitable to provide services for the user terminal UE.
Referring to fig. 3, in step S303, the second AMF transmits information of the user terminal UE to the first AMF.
Referring to fig. 3, in step S304, the first AMF determines whether a policy container is included in the information of the user terminal.
Referring to fig. 3, in step S305, the first AMF transmits a policy container to the first PCF when the policy container is included in the information of the user terminal.
Referring to fig. 3, in step S306, the first PCF configures a policy of the user terminal according to the policy container.
Referring to fig. 3, in step S307, the first PCF transmits the policy of the user terminal to the user terminal through the first AMF and the RAN to cause the user terminal UE to update the policy configuration.
Referring to fig. 3, in step S308, the first AMF transmits a request for providing a policy container to the user terminal UE through the RAN when the policy container is not included in the information of the user terminal.
Referring to fig. 3, in step S309, the user terminal UE transmits a policy container to the first AMF.
Referring to fig. 3, in step S310, a first AMF transmits a policy container first PCF.
Referring to fig. 3, in step S311, the first PCF configures the policy of the user terminal according to the policy container.
Referring to fig. 3, in step S312, the first PCF transmits the policy of the user terminal to the user terminal through the first AMF and the RAN to cause the user terminal UE to update the policy configuration.
The configuration method of the user terminal policy of fig. 3 includes that the user terminal UE sends an access request or a session establishment request to the base station RAN side, and sends the access request or the session establishment request to the second AMF through the RAN; the second AMF judges that the service is not suitable for providing the service for the user terminal UE; the second AMF sends a request of the user terminal UE to the first AMF; the first AMF judges whether the request information of the user terminal comprises a strategy container or not; when the first AMF comprises a policy container in the request information of the user terminal, the policy container is sent to the first PCF; the first PCF configures the strategy of the user terminal according to the strategy container; the first PCF sends the strategy of the user terminal to the user terminal through the first AMF and the RAN so as to enable the user terminal UE to update the strategy configuration; when the information of the user terminal does not comprise a strategy container, the first AMF sends a request for providing the strategy container to the user terminal UE through the RAN; a policy container sent by a user terminal (UE) to a first AM; policy container first PCF sent by first AMF; the first PCF sends the policy of the user terminal to the user terminal through the first AMF and the RAN to enable the user terminal UE to update the policy configuration, which may enable the policy of the user terminal to be configured when the AMF redirects.
Fig. 4 shows a schematic structural diagram of a communication apparatus according to an embodiment of the present disclosure.
Based on the same inventive concept as the method embodiment, the present application further provides an apparatus 400, which is configured to execute the method executed by the terminal device and the various network devices (such as RAN, AMF or PCF) in the method embodiment shown in fig. 2 to 3, and relevant features may be referred to the method embodiment and are not repeated herein. As an example, as shown in fig. 4, an apparatus 400 includes a transceiver module 401 and a processing module 402.
For specific functions of the transceiver module 401 and the processing module 402, reference may be made to the descriptions in the above method embodiments, and will not be described here.
And will not be described again here. The division of the units in the embodiments of the present application is schematically shown, which is merely a logic function division, and may have another division manner when actually implemented, and in addition, each functional unit in each embodiment of the present application may be integrated in one processor, or may exist separately and physically, or may be integrated in one module by two or more units. The integrated units may be implemented in hardware or in software functional modules.
The integrated unit, if implemented in the form of a software functional unit and sold or used as a stand-alone product, may be stored in a computer readable storage medium. Based on such understanding, the technical solution of the present application may be embodied essentially or in a part contributing to the prior art or in whole or in part in the form of a software product stored in a storage medium, including several instructions for causing a terminal device (which may be a personal computer, a mobile phone, or a network device, etc.) or a processor (processor) to perform all or part of the steps of the method according to the embodiments of the present application. And the aforementioned storage medium includes: a U-disk, a removable hard disk, a read-only memory (ROM), a random access memory (random access memory, RAM), a magnetic disk, or an optical disk, or other various media capable of storing program codes.
In the embodiment of the application, the terminal device and the network device can be respectively presented in the form of dividing each functional module in an integrated manner. A "module" herein may refer to a particular ASIC, an electronic circuit, a processor and memory that execute one or more software or firmware programs, an integrated logic circuit, and/or other device that can provide the described functionality.
Fig. 5 shows a schematic structural diagram of a communication apparatus according to an embodiment of the present disclosure.
In a simple embodiment, the communication device 500 as shown in fig. 5 comprises at least one processor 501, a memory 502, and optionally a communication interface 503.
Memory 502 may be a volatile memory, such as a random access memory; the memory may also be a non-volatile memory such as, but not limited to, read-only memory, flash memory, hard disk (HDD) or Solid State Drive (SSD), or the memory 502 may be any other medium that can be used to carry or store desired program code in the form of instructions or data structures and that can be accessed by a computer. Memory 502 may be a combination of the above.
The specific connection medium between the processor 501 and the memory 502 is not limited in the embodiments of the present application. In the embodiment of the present application, the memory 502 and the processor 501 are connected through the bus 504, where the bus 504 is indicated by a thick line in the figure, and the connection manner between other components is only schematically illustrated, and is not limited thereto. The bus 504 may be divided into an address bus, a data bus, a control bus, etc. For ease of illustration, only one thick line is shown in fig. 5, but not only one bus or one type of bus.
The processor 501 may have a data transceiver function and may be capable of communicating with other devices, and in the apparatus shown in fig. 5, a separate data transceiver module, for example, a communication interface 503, may be provided for transceiving data; the processor 501 may communicate with other devices via the communication interface 503 for data transmission.
In one example, when the terminal device takes the form shown in fig. 5, the processor in fig. 5 may cause the terminal device to perform the method performed by the terminal device in any of the method embodiments described above by invoking computer-executable instructions stored in the memory 502.
Specifically, the functions/implementation of the processing module and the transceiver module of fig. 4 may be implemented by the processor 501 in fig. 5 invoking computer executable instructions stored in the memory 502. Alternatively, the functions/implementation of the processing module of fig. 4 may be implemented by the processor 501 in fig. 5 invoking computer executable instructions stored in the memory 502, and the functions/implementation of the transceiver module of fig. 4 may be implemented by the communication interface 503 in fig. 5.
In another example, when the network device takes the form shown in fig. 5, the processor in fig. 5 may invoke computer-executable instructions stored in the memory 502 to cause the authentication server function to perform the method performed by the network device in any of the method embodiments described above.
The embodiment of the application also provides a communication system, which can comprise an access and mobility management function network element AMF and a policy control function network element PCF. Optionally, a RAN is also included.
It will be appreciated by those skilled in the art that embodiments of the present application may be provided as a method, system, or computer program product. Accordingly, the present application may take the form of an entirely hardware embodiment, an entirely software embodiment, or an embodiment combining software and hardware aspects. Furthermore, the present application may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, and the like) having computer-usable program code embodied therein.
The present application is described with reference to flowchart illustrations and/or block diagrams of methods, apparatus (systems) and computer program products according to the application. It will be understood that each flow and/or block of the flowchart illustrations and/or block diagrams, and combinations of flows and/or blocks in the flowchart illustrations and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, embedded processor, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable data processing apparatus to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including instruction means which implement the function specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be loaded onto a computer or other programmable data processing apparatus to cause a series of operational steps to be performed on the computer or other programmable apparatus to produce a computer implemented process such that the instructions which execute on the computer or other programmable apparatus provide steps for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
It will be apparent to those skilled in the art that various modifications and variations can be made in the present application without departing from the scope of the application. Thus, if such modifications and variations of the present application fall within the scope of the claims and the equivalents thereof, the present application is intended to cover such modifications and variations.

Claims (11)

1. A method for configuring a policy of a user terminal, the method comprising:
the first access and mobility management function AMF receives information of the user terminal sent by the second AMF;
the first AMF sends a request for providing a policy container to the user terminal when the policy container is not included in the information of the user terminal;
the first AMF receives the strategy container sent by the user terminal;
the first AMF sends the policy container to a first policy control function PCF, so that the first PCF configures the policy of the user terminal according to the policy container.
2. The method as recited in claim 1, further comprising:
and the first AMF judges whether the information of the user terminal comprises the strategy container.
3. The method as recited in claim 2, further comprising:
and when the first AMF comprises the strategy container in the information of the user terminal, the strategy container is sent to the first PCF, so that the first PCF configures the strategy of the user terminal according to the strategy container.
4. The method of claim 3, wherein the step of,
the policy container includes a list of policy segment identifiers, an operating system identifier, and an indication of access network service discovery and selection policies supported by the user terminal.
5. The method of claim 1, wherein causing the first PCF to configure the policy of the user terminal according to the policy container comprises:
the first AMF receives the strategy of the user terminal configured by the first PCF according to the strategy container;
the first AMF sends the strategy of the user terminal to the user terminal so that the user terminal updates the strategy configuration.
6. The method of claim 1, wherein causing the first PCF to configure the policy of the user terminal according to the policy container comprises:
and the first PCF configures an access network service discovery and selection strategy of the user terminal or a user terminal routing strategy according to the strategy container.
7. The method of claim 1, wherein causing the first PCF to configure the policy of the user terminal according to the policy container comprises:
and enabling the first PCF to configure the strategy of the user terminal according to the strategy container and the local strategy of the first PCF.
8. A communication device, characterized in that the device comprises a processing module and a transceiver module for the device to implement the method according to any of claims 1 to 7.
9. A communication apparatus, comprising: a processor coupled to a memory for storing a program or instructions that, when executed by the processor, cause the apparatus to perform the method of any one of claims 1 to 7.
10. A computer readable storage medium having stored thereon a computer program or instructions, which when executed cause a computer to perform the method of any of claims 1 to 7.
11. A chip comprising a processor coupled to a memory for storing a program or instructions that, when executed by the processor, cause an apparatus to perform the method of any of claims 1 to 7.
CN202211193867.4A 2022-09-28 2022-09-28 User terminal strategy configuration method, device, medium and chip Pending CN117793737A (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN202211193867.4A CN117793737A (en) 2022-09-28 2022-09-28 User terminal strategy configuration method, device, medium and chip
PCT/CN2023/116590 WO2024066924A1 (en) 2022-09-28 2023-09-01 User terminal policy configuration method and apparatus, and medium and chip

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202211193867.4A CN117793737A (en) 2022-09-28 2022-09-28 User terminal strategy configuration method, device, medium and chip

Publications (1)

Publication Number Publication Date
CN117793737A true CN117793737A (en) 2024-03-29

Family

ID=90389650

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202211193867.4A Pending CN117793737A (en) 2022-09-28 2022-09-28 User terminal strategy configuration method, device, medium and chip

Country Status (2)

Country Link
CN (1) CN117793737A (en)
WO (1) WO2024066924A1 (en)

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114827982A (en) * 2018-01-15 2022-07-29 华为技术有限公司 Method, device and system for configuring strategy of UE
US10524198B2 (en) * 2018-05-18 2019-12-31 Intel Corporation UE indication to PCF whether or not to send UE policy
CN111200810B (en) * 2018-11-19 2021-06-04 华为技术有限公司 Method, device and system for acquiring capability information of terminal
US20220377529A1 (en) * 2019-11-08 2022-11-24 Lg Electronics Inc. Network control method for transmitting ue policy

Also Published As

Publication number Publication date
WO2024066924A1 (en) 2024-04-04

Similar Documents

Publication Publication Date Title
KR102601585B1 (en) Systems and method for security protection of nas messages
EP4021047A1 (en) Authentication for relay
CN114503536B (en) Communication related to changes in application servers
CN112219428A (en) Apparatus and method for policy management of user equipment in wireless communication system
CN109247076A (en) Selection method, radio reception device and the terminal of network slice
US20230199632A1 (en) Access to Second Network
CN114557031B (en) Method for moving PDU session on non-3 GPP to 3GPP access
US20220264407A1 (en) Communications device, infrastructure equipment, core network element and methods
US20230189192A1 (en) Access to Second Network by Wireless Device
KR20220135254A (en) Systems and method for secure updates of configuration parameters provisioned in user equipment
US11877351B2 (en) Provision GPSI pertaining to PDU session(s)
KR20200117003A (en) Method and device for determining the SSC mode
CN113676904B (en) Slice authentication method and device
EP3790352B1 (en) Communication method, apparatus, computer-readable storage medium and system
US20230136425A1 (en) N14 interface support indicator for service continuity
US20230126582A1 (en) Method for selecting relay device, remote device and relay device
CN117062071A (en) Authentication method, communication device, and computer-readable storage medium
CN117793737A (en) User terminal strategy configuration method, device, medium and chip
CN115039390A (en) Communication control method, device, equipment and storage medium
EP4216622A2 (en) Network registration method for traffic steering and device supporting the same
EP4271113A1 (en) Communication method and apparatus
CN117062187A (en) Communication method and device
CN117354739A (en) Group data rate control method, device, medium and chip
CN117596584A (en) Communication method and communication device
CN117083890A (en) Device and method for coordinating registration process of accessing unmanned aerial vehicle service

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination