WO2020087327A1 - 通信方法和设备 - Google Patents

通信方法和设备 Download PDF

Info

Publication number
WO2020087327A1
WO2020087327A1 PCT/CN2018/112924 CN2018112924W WO2020087327A1 WO 2020087327 A1 WO2020087327 A1 WO 2020087327A1 CN 2018112924 W CN2018112924 W CN 2018112924W WO 2020087327 A1 WO2020087327 A1 WO 2020087327A1
Authority
WO
WIPO (PCT)
Prior art keywords
terminal device
network
core network
access
service
Prior art date
Application number
PCT/CN2018/112924
Other languages
English (en)
French (fr)
Inventor
刘建华
Original Assignee
Oppo广东移动通信有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Oppo广东移动通信有限公司 filed Critical Oppo广东移动通信有限公司
Priority to PCT/CN2018/112924 priority Critical patent/WO2020087327A1/zh
Priority to CN201880097268.8A priority patent/CN112655182B/zh
Publication of WO2020087327A1 publication Critical patent/WO2020087327A1/zh

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/40Network security protocols

Definitions

  • This application relates to the field of communication, and in particular to a communication method and device.
  • the New Radio (NR) system (or 5G system, 5G network) introduces a non-public core network deployed by operators.
  • the terminal equipment will continue to move.
  • PLMN Public Land Mobile Network
  • Embodiments of the present application provide a communication method and device, which can enable a terminal device that has a contract with a PLMN to access a non-public core network deployed by an operator.
  • a communication method includes: a terminal device obtains a first identifier for accessing a first network, the first network is a non-public core network deployed by an operator, The public land mobile network PLMN has a contract;
  • the terminal device accesses the first network based on the first identification.
  • a communication method includes: a core network device receives a second request message sent by a terminal device, where the second request message includes a first identifier and an identifier of the terminal device to access a first network
  • the identifier of the terminal device, the first network is a non-public core network deployed by an operator, and the terminal device has a contract with a public land mobile network PLMN;
  • the core network device sends a second request response message to the terminal device, where the second request response message is used to indicate whether the terminal device is allowed to access the first network.
  • a communication method includes: a first device receives a first request message sent by a terminal device, where the first request message is used to request a first identification to access a first network,
  • the first network is a non-public core network deployed by an operator, and the terminal device has a contractual relationship with a public land mobile network PLMN;
  • the first device sends a first request response message to the terminal device, where the first request response message includes the first identification.
  • a terminal device for performing the method in the above-mentioned first aspect or various implementations thereof.
  • the terminal device includes a functional module for performing the method in the above-mentioned first aspect or various implementations thereof.
  • a core network device is provided for performing the method in the second aspect or its implementations.
  • the core network device includes a functional module for performing the method in the above-mentioned second aspect or various implementations thereof.
  • a communication device for performing the method in the third aspect or its implementations.
  • the communication device includes a functional module for performing the method in the third aspect or its implementations.
  • a terminal device including a processor and a memory.
  • the memory is used to store a computer program
  • the processor is used to call and run the computer program stored in the memory to execute the method in the first aspect or the various implementations thereof.
  • a core network device including a processor and a memory.
  • the memory is used to store a computer program, and the processor is used to call and run the computer program stored in the memory to execute the method in the above-mentioned second aspect or various implementations thereof.
  • a communication device including a processor and a memory.
  • the memory is used to store a computer program
  • the processor is used to call and run the computer program stored in the memory to execute the method in the third aspect or each implementation manner thereof.
  • a chip is provided for implementing any one of the first to third aspects or the method in each of the implementation manners.
  • the chip includes: a processor, configured to call and run a computer program from the memory, so that the device installed with the chip executes any one of the first to third aspects described above or various implementations thereof method.
  • a computer-readable storage medium for storing a computer program that causes a computer to execute the method in any one of the first to third aspects or the various implementations thereof.
  • a computer program product including computer program instructions, the computer program instructions causing a computer to execute the method in any one of the above first to third aspects or various implementations thereof.
  • a computer program which, when run on a computer, causes the computer to execute the method in any one of the first to third aspects or the various implementations thereof.
  • the terminal device when a terminal device that has a contract with a PLMN enters the non-public core network deployed by the operator, the terminal device can obtain an identity of the non-public core network deployed by the operator, so that it can access based on the acquired identity The non-public core network deployed by the operator.
  • FIG. 1 is a schematic diagram of a communication system architecture provided by an embodiment of the present application.
  • FIG. 2 is a schematic flowchart of a communication method provided by an embodiment of the present application.
  • FIG. 3 is a schematic flowchart of another communication method provided by an embodiment of the present application.
  • FIG. 4 is a schematic flowchart of another communication method provided by an embodiment of the present application.
  • FIG. 5 is a specific schematic interaction diagram of a communication method provided by an embodiment of the present application.
  • FIG. 6 is a schematic block diagram of a terminal device according to an embodiment of the present application.
  • FIG. 7 is a schematic block diagram of a core network device according to an embodiment of the present application.
  • FIG. 8 is a schematic block diagram of a communication device according to an embodiment of the present application.
  • FIG. 9 is a schematic block diagram of a communication device according to an embodiment of the present application.
  • FIG. 10 is a schematic block diagram of a chip according to an embodiment of the present application.
  • FIG. 11 is a schematic block diagram of a communication system according to an embodiment of the present application.
  • GSM Global System of Mobile
  • CDMA Code Division Multiple Access
  • WCDMA Broadband Code Division Multiple Access
  • GPRS General Packet Radio Service
  • LTE Long Term Evolution
  • FDD Frequency Division Duplex
  • TDD Time Division Duplex
  • UMTS Universal Mobile Telecommunication System
  • WiMAX Global Interoperability for Microwave Access
  • FIG. 1 shows a wireless communication system 100 applied in an embodiment of the present application.
  • the wireless communication system 100 may include an access network device 110.
  • the access network device 110 may be a device that communicates with a terminal device.
  • the access network device 110 can provide communication coverage for a specific geographic area, and can communicate with terminal devices located in the coverage area.
  • the access network device 110 may be a next generation radio access network (Next Generation Radio Access Network, NG), or a base station (gNB) in an NR system, or a cloud radio access network (Cloud Radio Access (Network, CRAN) wireless controller, or access network device 110 may be a mobile switching center, a relay station, an access point, a vehicle-mounted device, a wearable device, a hub, a switch, a bridge, a router, a network in a 5G network Side equipment or network equipment in a public land mobile network (PLMN) that will evolve in the future.
  • the access network device 110 may also be a base station in an LTE system, for example, an Evolved Universal Subgrade Radio Access Network (Evolved Universal Terrestrial Radio Access Network, E-UTRAN) device.
  • E-UTRAN Evolved Universal Terrestrial Radio Access Network
  • the wireless communication system 100 further includes at least one terminal device 120 located within the coverage of the access network device 110.
  • the terminal device 120 may be mobile or fixed.
  • the "terminal equipment" used herein includes, but is not limited to, a connection via a wired line, such as via a public switched telephone network (Public Switched Telephones, Networks, PSTN), digital subscriber line (Digital Subscriber Line, DSL), digital cable , Direct cable connection; and / or another data connection / network; and / or via wireless interfaces, such as for cellular networks, wireless local area networks (Wireless Local Area Network, WLAN), digital TV networks such as DVB-H networks, satellites Network, AM-FM broadcast transmitter; and / or another terminal device configured to receive / transmit communication signals; and / or Internet of Things (IoT) equipment.
  • IoT Internet of Things
  • a terminal device configured to communicate through a wireless interface may be referred to as a "wireless communication terminal", “wireless terminal”, or “mobile terminal”.
  • mobile terminals include, but are not limited to, satellite or cellular phones; Personal Communication Systems (PCS) terminals that can combine cellular radiotelephones with data processing, fax, and data communication capabilities; can include radiotelephones, pagers, Internet / internal PDA with Internet access, web browser, notepad, calendar, BeiDou Navigation System (BDS) and Global Positioning System (GPS) receiver; and regular laptop and / or handheld Type receiver or other electronic device including a radio telephone transceiver.
  • PCS Personal Communication Systems
  • BDS BeiDou Navigation System
  • GPS Global Positioning System
  • Terminal equipment can refer to access terminal, user equipment (User Equipment, UE), user unit, user station, mobile station, mobile station, remote station, remote terminal, mobile device, user terminal, terminal, wireless communication device, user agent or User device.
  • Access terminals can be cellular phones, cordless phones, Session Initiation Protocol (SIP) phones, wireless local loop (Wireless Local Loop, WLL) stations, personal digital processing (Personal Digital Assistant (PDA), wireless communication Functional handheld devices, computing devices, or other processing devices connected to a wireless modem, in-vehicle devices, wearable devices, terminal devices in a 5G network, or terminal devices in a future-evolving PLMN, etc.
  • SIP Session Initiation Protocol
  • WLL Wireless Local Loop
  • PDA Personal Digital Assistant
  • the wireless communication system 100 also includes a core network device 130 that communicates with an access network device.
  • the core network device 130 may be a 5G core network device, for example, an access and mobility management function (Access and Mobility Management Function, AMF), which is responsible for access and mobility management, and has the functions of authenticating and switching users , Location update and other functions.
  • AMF Access and Mobility Management Function
  • the session management function (Session Management Function, SMF) is responsible for session management, including the establishment, modification, and release of Packet Data Unit (PDU) sessions.
  • the user plane function User Plane Function, UPF is responsible for forwarding user data.
  • terminal direct connection (Device to Device, D2D) communication can be performed between terminal devices.
  • FIG. 1 exemplarily shows one access network device, one core network device and two terminal devices.
  • the wireless communication system 100 may include multiple access network devices and the coverage of each access network device Other numbers of terminal devices may be included in the scope, which is not limited in the embodiments of the present application.
  • the wireless communication system 100 may further include a mobile management entity (Mobile Management Entity, MME), unified data management (Unified Data Management, UDM), authentication server function (Authentication Server Function, AUSF), UPF, signaling gateway (Signaling Gateway, SGW) and other network entities, this embodiment of the present application does not limit this.
  • MME Mobile Management Entity
  • UDM Unified Data Management
  • AUSF Authentication Server Function
  • UPF Signaling gateway
  • SGW Signaling gateway
  • FIG. 1 exemplarily shows one network device and two terminal devices.
  • the communication system 100 may include multiple network devices and each network device may include other numbers of terminal devices within the coverage area. This application The embodiment does not limit this.
  • FIG. 2 is a schematic flowchart of a communication method 200 according to an embodiment of the present application, where the method may be executed by a terminal device.
  • the method 200 includes at least part of the following content.
  • the terminal device acquires a first identification to access the first network.
  • the first network is a non-public core network deployed by the operator, and the terminal equipment has a contract with the PLMN.
  • the terminal device accesses the first network based on the first identification.
  • FIG. 3 is a schematic flowchart of a communication method 300 according to an embodiment of the present application, where the method may be executed by a core network device.
  • the method 300 includes at least part of the following content.
  • the core network device receives the second request message sent by the terminal device.
  • the second request message may include a first identifier of the terminal device accessing the first network and an identifier of the terminal device.
  • the first network is a non-public core network deployed by the operator, and the terminal device has a contract with the PLMN.
  • the core network device sends a second request response message to the terminal device.
  • the second request response message is used to indicate whether the terminal device is allowed to access the first network.
  • FIG. 4 is a schematic flowchart of a communication method 400 according to an embodiment of the present application, where the method may be executed by a first device.
  • the method 400 includes at least part of the following content.
  • the first device receives the first request message sent by the terminal device.
  • the first request message is used to request a first identifier to access the first network.
  • the first network is a non-public core network deployed by the operator, and the terminal device has a contract with the PLMN.
  • the first device sends a first request response message to the terminal device, where the first request response message includes the first identification.
  • the first network may be, for example, a type-a network (Type-a Network, TAN).
  • Type-a Network TAN
  • VLAN networks can also be called non-public networks, providing non-public services.
  • the VLAN network can be TAN and Type-b Network (TBN), where TAN can access PLMN and provide PLMN service for UEs accessing TAN, TBN does not access PLMN and cannot provide UEs accessing TBN PLMN service.
  • TBN Type-b Network
  • TAN can access PLMN and provide PLMN service for UEs accessing TAN
  • TBN does not access PLMN and cannot provide UEs accessing TBN PLMN service.
  • TBN Type-b Network
  • the data may be transmitted to an external network, or the data transmission may be performed only within the TAN.
  • TBN performs data transmission, it can only carry out data transmission within TBN and has no contact with the outside.
  • the connection between the UPF of the TAN and the Data Network (DN) outside the PLMN network can be made through the interface N6. However, the TBN's UPF will not be connected to the DN outside the PLM
  • the first identification is an ID that can access the first network.
  • the first identification may be a verification code.
  • one terminal device may correspond to at least one first identification, and one first identification may also correspond to at least one terminal device.
  • the terminal device can obtain the first identifier for accessing the first network, which is not specifically limited in this embodiment of the present application.
  • the terminal device acquiring the first identification to access the first network may include: the terminal device sending a first request message to the first device, where the first request message may be used to request the first identification,
  • the request message may include the identification of the terminal device.
  • the first device may allocate the first identification to the terminal device.
  • the first device may send a first request response message to the terminal device, where the first request response message includes the first identification.
  • the terminal device may determine the first identification based on the first request response message.
  • the identification of the terminal device may include, but is not limited to, International Mobile Subscriber Identity (International Mobile Subscriber Identification Number, IMSI), UE ID, International Mobile Equipment Identity (International Mobile Equipment Identity, IMEI).
  • IMSI International Mobile Subscriber Identification Number
  • UE ID International Mobile Equipment Identity
  • IMEI International Mobile Equipment Identity
  • the identification of the terminal device may also be the mobile phone number of the terminal device.
  • the first device may be a core network device, an application server, or user equipment.
  • the first device may also determine the effective duration of the first identifier.
  • the effective duration of the first logo is 30s.
  • the first request response message may include the effective duration of the first identifier.
  • the corresponding relationship between the identifier of the terminal device and the first identifier reported by the terminal device may be saved.
  • the terminal device may acquire the first identification through interaction within the application.
  • the terminal device may apply for the first identification on an application program, that is, the terminal device may send a data packet to the application server. After the application server assigns the first identification to the terminal device, the first identification may be transmitted to the application device through the data packet.
  • Terminal Equipment Terminal Equipment
  • the terminal device may obtain the first identification through communication between user devices.
  • the first user equipment can tell the second user equipment the verification code, and after the second user equipment obtains the verification code, the verification code is input into the terminal device, so that the terminal device can obtain the verification code.
  • the method in the embodiment of the present application may further include: the terminal device receives a broadcast message sent by an access network device of the first network, where the broadcast message may include an identifier of the first network.
  • the broadcast message may further include indication information that allows the terminal device that has a contract with the PLMN to access the first network.
  • the terminal device After reading the identifier of the first network, the terminal device compares with the saved identifier of the first network, and if the read identifier of the first network is the same as the saved identifier of the first network, the terminal device may determine the current location Is covered by the first network, the terminal device can initiate registration with the first network.
  • the following description refers to the identifier of the first network stored in the terminal device as the identifier 1 of the first network.
  • the identity 1 of the first network may be obtained through the first identity, that is, the identity 1 of the first network may be included in the first identity.
  • the identifier 1 of the first network may be pre-configured on the terminal device.
  • the identifier 1 of the first network may be obtained by the terminal device from an application program.
  • the terminal device may send a second request message to the core network device, where the second request message may include the first identifier And terminal equipment identification.
  • the core network device may determine whether to allow the terminal device to access the first network. Thereafter, the core network device may send a second request response message to the terminal device, where the second request response message is used to indicate whether the terminal device is allowed to access the first network.
  • the terminal device may access the first network.
  • the core network device in the embodiment of the present application is the core network device of the first network.
  • the second request message may be a registration request message, or a Non-Access Stratum (NAS) message carrying a session establishment request message.
  • NAS Non-Access Stratum
  • the core network device determining whether to allow the terminal device to access the first network may include: the core network device determining whether to allow the terminal device to access the first network according to the first identifier and the identifier of the terminal device.
  • the core network device may determine whether the terminal device has a contract with the PLMN. If the terminal device has a contract with the PLMN, the core network device may send a verification request message to the first device, and the verification request message may include the first terminal device identification and the first identification. The first device verifies the terminal device based on the first terminal device identifier and the first identifier, and after obtaining the verification result, may send a verification response message to the core network device, where the verification response message includes the verification result. After that, the core network device may determine whether to allow the terminal device to access the first network based on the verification result.
  • the core network device determines whether the terminal device has a contract with the PLMN. As an example, it may include: the terminal device sends first indication information to the core network device, where the first indication information may be used to indicate that the terminal device has a contract with the PLMN. The core network device may determine that the terminal device has a contract with the PLMN according to the first instruction information.
  • the first indication information may be carried in the second request message.
  • the first indication information may indicate whether the terminal device has a contract with the PLMN through at least one bit.
  • the first indication information may indicate that the terminal device has not signed a contract with the PLMN through bit "0", and indicates that the terminal device has signed a contract with the PLMN through bit "1".
  • the number of bits of the first indication information may be multiple, if multiple bits are the same, it means that the terminal device has a contract with the PLMN, and if at least two of the multiple bits are different, it means that the terminal The device has no contract with PLMN. For example, "000" indicates that the terminal device has a contract with the PLMN, and "010" indicates that the terminal device has no contract with the PLMN.
  • the first indication information may indicate whether the terminal device has a contract with the PLMN through the first parameter.
  • the first indication information includes the first parameter, it indicates that the terminal device has a contract with the PLMN; if the first indication information does not include the first parameter, it indicates that the terminal device has not signed a contract with the PLMN.
  • the embodiment of the present application does not specifically limit the first parameter, and any parameter that can indicate whether the terminal device has a contract with the PLMN is included in the protection scope of the present application.
  • the first indication information may be identification information of the terminal device. That is, the core network device can determine whether the terminal device has a contract with the PLMN by identifying the identifier of the terminal device.
  • the first device checks the terminal device based on the first terminal device identification and the first identification, which may include: the first device stores the second identification and the terminal device identification, where the second The identifier is an identifier of the terminal device accessing the first network. After that, the first device may determine whether the included second identifier and the identifier of the terminal device are consistent with the identifier of the first terminal device and the first identifier reported by the core network device. If they are consistent, the first device may allow the terminal device to access the first network; if not, the first device does not allow the terminal device to access the first network.
  • the second identifier stored by the first device is ID 1
  • the identifier of the terminal device is ID 2
  • ID 1 corresponds to ID 2
  • the first identifier reported by the core network device is ID 1 '
  • the identifier of the first terminal device is ID 2 '
  • the first device checks whether the ID 1' and ID 2 'reported by the core network device are stored. If the first device determines that ID 1 'is the same as ID 1 and ID 2' is the same as ID 2, then the first device verifies that the ID 1 'and ID 2' reported by the core network device are saved. Then, the first device may detect whether the correspondence between ID 1 'and ID 2' has been consistent with the correspondence between ID 1 and ID 2. If they are consistent, the first device determines that the terminal device can access the first network; if they are not consistent, the first A device determines that the terminal device cannot access the first network.
  • the method in the embodiment of the present application may further include: the first device determines the effective duration for the terminal device to access the first network and / or the first device that allows the terminal device to access Business, where the first business is the business of the first network accessed by the terminal device.
  • the first service may be to surf the Internet or send text messages.
  • the verification response message may include the effective duration for the terminal device to access the first network and / or the first service that allows the terminal device to access.
  • the first device may determine the effective duration for the terminal device to access the first network according to the traffic volume of the first network at the current moment.
  • the effective time for the terminal device to access the first network may be short, such as 1 hour; if the service volume of the first network is small at the current moment, the terminal device The effective duration of entering the first network may be longer, such as 2 hours.
  • the first device may determine the effective duration for the terminal device to access the first network based on the preset value.
  • the preset value may be specified by the protocol. If the agreement stipulates that the effective time for the terminal device to access the first network is 2 hours.
  • the first service included in the verification response message that allows the terminal device to access may be the service type and identifier of the first service.
  • the identifier may be, for example, an application name, a data network name (Data Network Name, DNN), and single network slice selection assistance information (Single Network Slice Selection Assistance Information, S-NSSAI).
  • Data Network Name DNN
  • S-NSSAI Single Network Slice Selection Assistance Information
  • the method in the embodiment of the present application may further include: the core network device calls a contract request service to the UDM of the PLMN, where the contract request service is used to request contract information of the terminal device; the core network device receives the contract request response service invoked by the UDM, the The contract request response service includes third indication information, where the third indication information may be used to indicate a second service that is allowed to be accessed by the terminal device, and the second service is a service of the PLMN that the terminal device accesses through the first network.
  • the second service may be voice call, long-term evolution voice bearer (Voice over Long-Term Evolution, VoLTE), and so on.
  • the core network device may acquire the PLMN identification from the terminal device identification, and then invoke the subscription request service to the PLMN UDM based on the PLMN identification.
  • the third indication information may indicate the second service that the terminal device is allowed to access by indicating the service type and identification of the second service.
  • the service identifier of the second service may be, for example, the application name, DNN and S-NSSAI.
  • the method in the embodiment of the present application may further include: the terminal device receives second indication information sent by the core network device, where, The second indication information is used to indicate the first service and / or the second service that the terminal device is allowed to access.
  • the third indication information may be carried in the second request response message.
  • the core network device may send a NAS message to the terminal device, and the third indication information may be carried in the NAS message.
  • FIG. 5 provides a specific schematic diagram of an embodiment of the present application.
  • the first network is TAN
  • the first identification is the first ID
  • the terminal device that has a contract with the PLMN is PLMN UE
  • the identification of the PLMN UE is IMSI
  • the access network device of the first network is a wireless access network (Radio Access Network, RAN) -a
  • the core network device of the first network is AMF-a.
  • RAN Radio Access Network
  • the PLMN UE sends a first request message requesting access to the first ID of the TAN to the first device.
  • the first request message includes IMSI.
  • the first device After receiving the first request message, the first device allocates the first ID and the effective duration of the first ID to the PLMN UE, and stores the correspondence between the first ID and the IMSI.
  • the first device sends a first request response message to the PLMN UE, where the first request response message includes the first ID and the effective duration of the first ID.
  • RAN-a broadcasts the TAN ID.
  • RAN-a may also broadcast an instruction to allow PLMN UE access to TAN.
  • the PLMN UE sends a second request message to AMF-a.
  • the second request message may include an IMSI, a first ID, and indication information indicating that the UE is a PLMN UE.
  • the second request message may be a registration request message, or a NAS message carrying a PDU session establishment request message.
  • AMF-a If AMF-a recognizes that the UE is a PLMN UE, AMF-a checks the access of the PLMN UE and obtains the PLMN ID from the IMSI.
  • AMF-a invokes the subscription request service to the UDM of the PLMN based on the PLMN ID, and UDM invokes the subscription request response service to the core network device.
  • the subscription request response service may indicate that the PLMN UE is allowed to access the PLMN service and the ID + DNN + S-NSSAI of the service through the TAN.
  • AMF-a sends a verification request message to the first device, the verification request message including the IMSI and the first ID.
  • the first device After receiving the verification request message, the first device verifies whether the PLMN UE can access the TAN. If the PLMN UE can access the TAN, the first device determines the effective length of time that the PLMN UE can access the TAN and the TAN that can access the TAN Service type and ID.
  • the first device sends a verification response message to AMF-a, where the verification response message includes the IMSI, the first ID, the effective duration of access to the TAN, and the service type and ID of the TAN that allows PLMN UE access .
  • AMF-a sends a second request response message to the PLMN UE.
  • the second request response message includes the first ID, the verification result, the effective length of time that the TAN can be accessed, the service type and ID of the TAN that allows PLMN UE access, and the service type and PLMN of the PLMN that allows PLMN UE access through TAN ID.
  • the terminal device when a terminal device that has a contract with a PLMN enters a non-public core network deployed by an operator, the terminal device can obtain an identity of the access to the non-public core network deployed by the operator, so that it can be connected based on the acquired identity Into the non-public core network deployed by the operator.
  • FIG. 6 shows a schematic block diagram of a terminal device 600 according to an embodiment of the present application. As shown in FIG. 6, the terminal device 600 includes:
  • the processing unit 610 is configured to obtain a first identifier for accessing the first network.
  • the first network is a non-public core network deployed by an operator, and the terminal device 600 has a contract with the PLMN.
  • the processing unit 610 is also used to access the first network based on the first identification.
  • the terminal device 600 further includes: a communication unit 620, configured to send a first request message to the first device, where the first request message is used to request a first identifier, and the request message includes The identification of the terminal device 600;
  • the communication unit 620 is further configured to receive a first request response message sent by the first device, where the first request response message includes the first identification.
  • the first request response message further includes the effective duration of the first identifier.
  • the first device is a core network device, an application server, or user equipment.
  • the terminal device 600 further includes: a communication unit 620, configured to send a second request message to the core network device, where the second request message includes the first identifier and the identifier of the terminal device 600 ;
  • the communication unit 620 is further configured to receive a second request response message sent by the core network device, where the second request response message is used to indicate whether the terminal device 600 is allowed to access the first network.
  • the second request message further includes first indication information, and the first indication information is used to indicate that the terminal device 600 has a contract with the PLMN.
  • the second request response message includes an effective duration for the terminal device 600 to access the first network.
  • the terminal device 600 further includes: a communication unit 620, configured to receive second indication information sent by the core network device, where the second indication information is used to indicate that the terminal device 600 is allowed to access The first service and / or the second service, wherein the first service is a service of the first network accessed by the terminal device 600, and the second service is a service of the PLMN accessed by the terminal device 600 through the first network.
  • a communication unit 620 configured to receive second indication information sent by the core network device, where the second indication information is used to indicate that the terminal device 600 is allowed to access The first service and / or the second service, wherein the first service is a service of the first network accessed by the terminal device 600, and the second service is a service of the PLMN accessed by the terminal device 600 through the first network.
  • the core network device is the core network device of the first network.
  • terminal device 600 may correspond to the terminal device in the method 200, and the corresponding operation of the terminal device in the method 200 may be implemented. For the sake of brevity, details are not described here.
  • FIG. 7 shows a schematic block diagram of the core network device 700 of the embodiment of the present application.
  • the core network device 700 includes:
  • the communication unit 710 is configured to receive a second request message sent by the terminal device, where the second request message includes the first identifier of the terminal device accessing the first network and the identifier of the terminal device.
  • the first network is a non-public one deployed by the operator
  • the core network, terminal equipment and PLMN have a contract.
  • the communication unit 710 is further configured to send a second request response message to the terminal device, where the second request response message is used to indicate whether the terminal device is allowed to access the first network.
  • the core network device 700 further includes: a processing unit 720, configured to determine whether to allow the terminal device to access the first network according to the first identification and the identification of the terminal device.
  • the communication unit 710 is specifically configured to: send a verification request message to the first device, where the verification request message includes the first terminal device identifier and the first identifier;
  • the processing unit 720 is specifically configured to determine whether to allow the terminal device to access the first network based on the verification result.
  • the verification response message further includes a valid duration for the terminal device to access the first network and / or a first service that allows the terminal device to access, where the first service is the terminal device connection.
  • the first service is the terminal device connection.
  • the first device is a core network device, an application server, or user equipment.
  • the core network device 700 further includes: a processing unit 720, configured to determine whether the terminal device has a contract with the PLMN.
  • the processing unit 720 is specifically configured to: based on the first indication information, determine whether the terminal device has a contract with the PLMN, and the first indication information is used to indicate that the terminal device has a contract with the PLMN.
  • the first indication information is identification information of the terminal device.
  • the core network device 700 further includes: a processing unit 720, configured to call a contract request service to the UDM of the PLMN, and the contract request service is used to request contract information of the terminal device;
  • the communication unit 710 is further configured to: receive a contract request response service invoked by UDM, the contract request response service includes third indication information, and the third indication information is used to indicate a second service that allows the terminal device to access, the second service The service of the PLMN accessed by the terminal device through the first network.
  • the communication unit 710 is further configured to: send second indication information to the terminal device, where the second indication information is used to indicate the first service and / or the second that the terminal device is allowed to access Services, where the first service is the service of the first network accessed by the terminal device, and the second service is the service of the PLMN accessed by the terminal device through the first network.
  • the second request response message includes an effective duration for the terminal device to access the first network.
  • the core network device 700 is a core network device of the first network.
  • the core network device 700 may correspond to the core network device in the method 400, and the corresponding operation of the core network device in the method 400 may be implemented. For the sake of brevity, details are not described here.
  • FIG. 8 shows a schematic block diagram of a communication device 800 according to an embodiment of the present application.
  • the communication device 800 is the first device in the embodiment of the present application. As shown in FIG. 8, the communication device 800 includes:
  • the communication unit 810 is configured to receive a first request message sent by a terminal device, where the first request message is used to request a first identifier to access a first network.
  • the first network is a non-public core network deployed by an operator, and the terminal device Have a contract with PLMN.
  • the communication unit 810 is further configured to send a first request response message to the terminal device, where the first request response message includes the first identification.
  • the first request response message further includes the effective duration of the first identifier.
  • the communication unit 810 is further configured to: receive a verification request message sent by the core network device, where the verification request message includes the first terminal device identifier and the first identifier;
  • the communication device 810 further includes: a processing unit 820, configured to verify the terminal device based on the first terminal device identification and the first identification to obtain a verification result;
  • the processing unit 820 is also used to determine whether to allow the terminal device to access the first network based on the verification result.
  • the first request message includes an identifier of the terminal device
  • the processing unit 820 is further configured to: save the second identifier and the identifier of the terminal device, where the second identifier is the terminal device access The identification of the first network.
  • the processing unit 820 is specifically configured to: determine whether the saved second identifier and the identifier of the terminal device are consistent with the first terminal device identifier and the first identifier reported by the core network device;
  • the terminal device is allowed to access the first network; if not, the terminal device is not allowed to access the first network.
  • the processing unit 820 determines that the terminal device is allowed to access the first network, the processing unit 820 is further configured to: determine the effective duration for the terminal device to access the first network.
  • the communication unit 810 is further configured to: send a verification response message to the core network device, where the verification response message includes the verification result and the effective duration for the terminal device to access the first network.
  • the verification response message further includes a first service that allows the terminal device to access, where the first service is a service of the first network that the terminal device accesses.
  • the core network device is the core network device of the first network.
  • the first device is a core network device, an application server, or user equipment.
  • the communication device 800 may correspond to the communication device in the method 500, and the corresponding operation of the communication device in the method 500 may be implemented. For the sake of brevity, details are not described here.
  • FIG. 9 is a schematic structural diagram of a communication device 900 provided by an embodiment of the present application.
  • the communication device 900 shown in FIG. 9 includes a processor 910, and the processor 910 can call and run a computer program from the memory to implement the method in the embodiment of the present application.
  • the communication device 900 may further include a memory 920.
  • the processor 910 can call and run a computer program from the memory 920 to implement the method in the embodiments of the present application.
  • the memory 920 may be a separate device independent of the processor 910, or may be integrated in the processor 910.
  • the communication device 900 may further include a transceiver 930, and the processor 910 may control the transceiver 930 to communicate with other devices, specifically, may send information or data to other devices, or receive other Information or data sent by the device.
  • the transceiver 930 may include a transmitter and a receiver.
  • the transceiver 930 may further include antennas, and the number of antennas may be one or more.
  • the communication device 900 may specifically be a terminal device according to an embodiment of the present application, and the communication device 900 may implement the corresponding process implemented by the terminal device in each method of the embodiment of the present application. .
  • the communication device 900 may specifically be a core network device according to an embodiment of the present application, and the communication device 900 may implement the corresponding process implemented by the core network device in each method of the embodiment of the present application. Repeat again.
  • the communication device 900 may specifically be the first device of the embodiment of the present application, and the communication device 900 may implement the corresponding process implemented by the first device in each method of the embodiment of the present application. Repeat again.
  • FIG. 10 is a schematic structural diagram of a chip according to an embodiment of the present application.
  • the chip 1000 shown in FIG. 10 includes a processor 1010, and the processor 1010 can call and run a computer program from a memory to implement the method in the embodiment of the present application.
  • the chip 1000 may further include a memory 1020.
  • the processor 1010 can call and run a computer program from the memory 1020 to implement the method in the embodiments of the present application.
  • the memory 1020 may be a separate device independent of the processor 1010, or may be integrated in the processor 1010.
  • the chip 1000 may further include an input interface 1030.
  • the processor 1010 can control the input interface 1030 to communicate with other devices or chips. Specifically, it can obtain information or data sent by other devices or chips.
  • the chip 1000 may further include an output interface 1040.
  • the processor 1010 can control the output interface 1040 to communicate with other devices or chips. Specifically, it can output information or data to other devices or chips.
  • the chip can be applied to the terminal device in the embodiment of the present application, and the chip can implement the corresponding process implemented by the terminal device in each method of the embodiment of the present application.
  • the chip can implement the corresponding process implemented by the terminal device in each method of the embodiment of the present application.
  • the chip can be applied to the core network device in the embodiment of the present application, and the chip can implement the corresponding process implemented by the core network device in each method of the embodiment of the present application.
  • the chip can implement the corresponding process implemented by the core network device in each method of the embodiment of the present application.
  • the chip may be applied to the first device in the embodiment of the present application, and the chip may implement the corresponding process implemented by the first device in each method of the embodiment of the present application, and for the sake of brevity, no further description is provided here.
  • chips mentioned in the embodiments of the present application may also be referred to as system-on-chips, system chips, chip systems, or system-on-chip chips.
  • the processor in the embodiment of the present application may be an integrated circuit chip, which has signal processing capabilities.
  • each step of the foregoing method embodiment may be completed by an integrated logic circuit of hardware in a processor or instructions in the form of software.
  • the above-mentioned processor may be a general-purpose processor, a digital signal processor (Digital Signal Processor, DSP), an application specific integrated circuit (Application Specific Integrated Circuit, ASIC), an existing programmable gate array (Field Programmable Gate Array, FPGA), or other available Programming logic devices, discrete gates or transistor logic devices, discrete hardware components.
  • DSP Digital Signal Processor
  • ASIC Application Specific Integrated Circuit
  • FPGA Field Programmable Gate Array
  • the methods, steps, and logical block diagrams disclosed in the embodiments of the present application may be implemented or executed.
  • the general-purpose processor may be a microprocessor or the processor may be any conventional processor or the like.
  • the steps of the method disclosed in conjunction with the embodiments of the present application may be directly embodied and executed by a hardware decoding processor, or may be executed and completed by a combination of hardware and software modules in the decoding processor.
  • the software module may be located in a mature storage medium in the art, such as random access memory, flash memory, read-only memory, programmable read-only memory, or electrically erasable programmable memory, and registers.
  • the storage medium is located in the memory, and the processor reads the information in the memory and completes the steps of the above method in combination with its hardware.
  • the memory in the embodiments of the present application may be volatile memory or non-volatile memory, or may include both volatile and non-volatile memory.
  • the non-volatile memory may be read-only memory (Read-Only Memory, ROM), programmable read-only memory (Programmable ROM, PROM), erasable programmable read-only memory (Erasable PROM, EPROM), electronically Erasable programmable read only memory (Electrically, EPROM, EEPROM) or flash memory.
  • the volatile memory may be a random access memory (Random Access Memory, RAM), which is used as an external cache.
  • RAM static random access memory
  • DRAM dynamic random access memory
  • DRAM synchronous dynamic random access memory
  • SDRAM double data rate synchronous dynamic random access memory
  • Double Data Rate SDRAM DDR SDRAM
  • enhanced SDRAM ESDRAM
  • Synchlink DRAM SLDRAM
  • Direct Rambus RAM Direct Rambus RAM
  • the memory in the embodiments of the present application may also be static random access memory (static RAM, SRAM), dynamic random access memory (dynamic RAM, DRAM), Synchronous dynamic random access memory (synchronous) DRAM (SDRAM), double data rate synchronous dynamic random access memory (double data) SDRAM (DDR SDRAM), enhanced synchronous dynamic random access memory (enhanced SDRAM, ESDRAM), synchronous connection Dynamic random access memory (synch link DRAM, SLDRAM) and direct memory bus random access memory (Direct Rambus RAM, DR RAM) and so on. That is to say, the memories in the embodiments of the present application are intended to include but are not limited to these and any other suitable types of memories.
  • FIG. 11 is a schematic block diagram of a communication system 1100 provided by an embodiment of the present application. As shown in FIG. 11, the communication system 1100 includes a terminal device 1110, a core network device 1120, and a first device 1130.
  • the terminal device 1110 may be used to implement the corresponding function implemented by the terminal device in the above method
  • the core network device 1120 may be used to implement the corresponding function implemented by the core network device in the above method
  • the first device 1130 It can be used to implement the corresponding function implemented by the first device in the above method, and for the sake of brevity, it will not be repeated here.
  • Embodiments of the present application also provide a computer-readable storage medium for storing computer programs.
  • the computer-readable storage medium may be applied to the terminal device in the embodiments of the present application, and the computer program causes the computer to execute the corresponding process implemented by the terminal device in each method of the embodiments of the present application. No longer.
  • the computer-readable storage medium may be applied to the core network device in the embodiments of the present application, and the computer program causes the computer to execute the corresponding process implemented by the core network device in each method of the embodiments of the present application. I will not repeat them here.
  • the computer-readable storage medium may be applied to the first device in the embodiment of the present application, and the computer program causes the computer to execute the corresponding process implemented by the first device in each method of the embodiment of the present application. For simplicity, I will not repeat them here.
  • An embodiment of the present application also provides a computer program product, including computer program instructions.
  • the computer program product can be applied to the terminal device in the embodiments of the present application, and the computer program instructions cause the computer to execute the corresponding process implemented by the terminal device in each method of the embodiment of the present application. Repeat again.
  • the computer program product can be applied to the core network device in the embodiments of the present application, and the computer program instructions cause the computer to execute the corresponding process implemented by the core network device in each method of the embodiments of the present application. This will not be repeated here.
  • the computer program product may be applied to the first device in the embodiments of the present application, and the computer program instructions cause the computer to execute the corresponding process implemented by the first device in each method of the embodiments of the present application. This will not be repeated here.
  • An embodiment of the present application also provides a computer program.
  • the computer program can be applied to the terminal device in the embodiments of the present application.
  • the computer program runs on the computer, the computer is allowed to execute the corresponding process implemented by the terminal device in each method of the embodiments of the present application. , Will not repeat them here.
  • the computer program can be applied to the core network device in the embodiment of the present application.
  • the computer program runs on the computer, the computer is allowed to execute the corresponding process implemented by the core network device in each method of the embodiment of the present application.
  • I will not repeat them here.
  • the computer program can be applied to the first device in the embodiment of the present application.
  • the computer program runs on the computer, the computer is allowed to execute the corresponding process implemented by the first device in each method of the embodiment of the present application.
  • I will not repeat them here.
  • the disclosed system, device, and method may be implemented in other ways.
  • the device embodiments described above are only schematic.
  • the division of the units is only a division of logical functions.
  • there may be other divisions for example, multiple units or components may be combined or Can be integrated into another system, or some features can be ignored, or not implemented.
  • the displayed or discussed mutual coupling or direct coupling or communication connection may be indirect coupling or communication connection through some interfaces, devices or units, and may be in electrical, mechanical or other forms.
  • the units described as separate components may or may not be physically separated, and the components displayed as units may or may not be physical units, that is, they may be located in one place, or may be distributed on multiple network units. Some or all of the units may be selected according to actual needs to achieve the purpose of the solution of this embodiment.
  • each functional unit in each embodiment of the present application may be integrated into one processing unit, or each unit may exist alone physically, or two or more units may be integrated into one unit.
  • the functions are implemented in the form of software functional units and sold or used as independent products, they can be stored in a computer-readable storage medium.
  • the technical solution of the present application essentially or part of the contribution to the existing technology or part of the technical solution can be embodied in the form of a software product
  • the computer software product is stored in a storage medium, including Several instructions are used to enable a computer device (which may be a personal computer, server, or network device, etc.) to perform all or part of the steps of the methods described in the embodiments of the present application.
  • the aforementioned storage media include: U disk, mobile hard disk, read-only memory (Read-Only Memory, ROM), random access memory (Random Access Memory, RAM), magnetic disk or optical disk and other media that can store program code .

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

本申请实施例涉及一种通信方法和设备,该方法包括:终端设备获取接入第一网络的第一标识,该第一网络为运营商部署的非公有的核心网,该终端设备与公共陆地移动网络PLMN有签约;该终端设备基于该第一标识,接入该第一网络。本申请实施例的通信方法和设备,可以使与PLMN有签约的终端设备接入TAN。

Description

通信方法和设备 技术领域
本申请涉及通信领域,具体涉及一种通信方法和设备。
背景技术
新无线(New Radio,NR)系统(或称5G系统、5G网络)引入了运营商部署的非公有的核心网。
通常情况下,终端设备会不停的移动。当公共陆地移动网络(Public Land Mobile Network,PLMN)的终端设备进入运营商部署的非公有的核心网的覆盖范围内时,如何使与PLMN签约的终端设备接入运营商部署的非公有的核心网,目前还没有明确的规定。
发明内容
本申请实施例提供一种通信方法和设备,可以使与PLMN有签约的终端设备接入运营商部署的非公有的核心网。
第一方面,提供了一种通信方法,所述方法包括:终端设备获取接入第一网络的第一标识,所述第一网络为运营商部署的非公有的核心网,所述终端设备与公共陆地移动网络PLMN有签约;
所述终端设备基于所述第一标识,接入所述第一网络。
第二方面,提供了一种通信方法,所述方法包括:核心网设备接收终端设备发送的第二请求消息,所述第二请求消息包括所述终端设备接入第一网络的第一标识和所述终端设备的标识,所述第一网络为运营商部署的非公有的核心网,所述终端设备与公共陆地移动网络PLMN有签约;
所述核心网设备向所述终端设备发送第二请求响应消息,所述第二请求响应消息用于指示是否允许所述终端设备接入所述第一网络。
第三方面,提供了一种通信方法,所述方法包括:第一设备接收终端设备发送的第一请求消息,所述第一请求消息用于请求接入第一网络的第一标识,所述第一网络为运营商部署的非公有的核心网,所述终端设备与公共陆地移动网络PLMN有签约关系;
所述第一设备向所述终端设备发送第一请求响应消息,所述第一请求响应消息包括所述第一标识。
第四方面,提供了一种终端设备,用于执行上述第一方面或其各实现方式中的方法。
具体地,该终端设备包括用于执行上述第一方面或其各实现方式中的方法的功能模块。
第五方面,提供了一种核心网设备,用于执行上述第二方面或其各实现方式中的方法。
具体地,该核心网设备包括用于执行上述第二方面或其各实现方式中的方法的功能模块。
第六方面,提供了一种通信设备,用于执行上述第三方面或其各实现方式中的方法。
具体地,该通信设备包括用于执行上述第三方面或其各实现方式中的方法的功能模块。
第七方面,提供了一种终端设备,包括处理器和存储器。该存储器用于存储计算机程序,该处理器用于调用并运行该存储器中存储的计算机程序,执行上述第一方面或其各实现方式中的方法。
第八方面,提供了一种核心网设备,包括处理器和存储器。该存储器用于存储计算机程序,该处理器用于调用并运行该存储器中存储的计算机程序,执行上述第二方面或其各实现方式中的方法。
第九方面,提供了一种通信设备,包括处理器和存储器。该存储器用于存储计算机程序,该处理器用于调用并运行该存储器中存储的计算机程序,执行上述第三方面或其各实现方式中的方法。
第十方面,提供了一种芯片,用于实现上述第一方面至第三方面中的任一方面或其各实现方式中的方法。
具体地,该芯片包括:处理器,用于从存储器中调用并运行计算机程序,使得安装有该芯片的设备执行如上述第一方面至第三方面中的任一方面或其各实现方式中的方法。
第十一方面,提供了一种计算机可读存储介质,用于存储计算机程序,该计算机程序使得计算机执行上述第一方面至第三方面中的任一方面或其各实现方式中的方法。
第十二方面,提供了一种计算机程序产品,包括计算机程序指令,该计算机程序指令使得计算机执行上述第一方面至第三方面中的任一方面或其各实现方式中的方法。
第十三方面,提供了一种计算机程序,当其在计算机上运行时,使得计算机执行上述第一方面至第三方面中的任一方面或其各实现方式中的方法。
上述技术方案,当与PLMN有签约的终端设备进入运营商部署的非公有的核心网时,终端设备可以获得接入运营商部署的非公有的核心网的标识,从而可以基于获取的标识接入运营商部署的非公有的核心网。
附图说明
图1是本申请实施例提供的一种通信系统架构的示意性图。
图2是本申请实施例提供的一种通信方法的示意性流程图。
图3是本申请实施例提供的另一种通信方法的示意性流程图。
图4是本申请实施例提供的另一种通信方法的示意性流程图。
图5是本申请实施例提供的一种通信方法的具体示意性交互图。
图6是根据本申请实施例的终端设备的示意性框图。
图7是根据本申请实施例的核心网设备的示意性框图。
图8是根据本申请实施例的通信设备的示意性框图。
图9是根据本申请实施例的通信设备的示意性框图。
图10是根据本申请实施例的芯片的示意性框图。
图11是根据本申请实施例的通信系统的示意性框图。
具体实施方式
下面将结合本申请实施例中的附图,对本申请实施例中的技术方案进行描述,显然,所描述的实施例是本申请一部分实施例,而不是全部的实施例。基于本申请中的实施例,本领域普通技术人员在没有做出创造性劳动前提下所获得的所有其他实施例,都属于本申请保护的范围。
本申请实施例的技术方案可以应用于各种通信系统,例如:全球移动通讯(Global System of Mobile communication,GSM)系统、码分多址(Code Division Multiple Access,CDMA)系统、宽带码分多址(Wideband Code Division Multiple Access,WCDMA)系统、通用分组无线业务(General Packet Radio Service,GPRS)、长期演进(Long Term Evolution,LTE)系统、LTE频分双工(Frequency Division Duplex,FDD)系统、LTE时分双工(Time Division Duplex,TDD)、通用移动通信系统(Universal Mobile Telecommunication System,UMTS)、全球互联微波接入(Worldwide Interoperability for Microwave Access,WiMAX)通信系统或5G系统,或者后续版本的通信系统中。
图1示出了本申请实施例应用的无线通信系统100。该无线通信系统100可以包括接入网设备110。接入网设备110可以是与终端设备通信的设备。接入网设备110可以为 特定的地理区域提供通信覆盖,并且可以与位于该覆盖区域内的终端设备进行通信。可选地,该接入网设备110可以是下一代无线接入网(Next Generation Radio Access Network,NG RAN),或者是NR系统中的基站(gNB),或者是云无线接入网络(Cloud Radio Access Network,CRAN)中的无线控制器,或者接入网设备110可以为移动交换中心、中继站、接入点、车载设备、可穿戴设备、集线器、交换机、网桥、路由器、5G网络中的网络侧设备或者未来演进的公共陆地移动网络(Public Land Mobile Network,PLMN)中的网络设备等。可选地,该接入网设备110也可以是LTE系统中的基站,例如,演进的通用路基无线接入网(Evolved Universal Terrestrial Radio Access Network,E-UTRAN)设备。
该无线通信系统100还包括位于接入网设备110覆盖范围内的至少一个终端设备120。终端设备120可以是移动的或固定的。可选地,作为在此使用的“终端设备”包括但不限于经由有线线路连接,如经由公共交换电话网络(Public Switched Telephone Networks,PSTN)、数字用户线路(Digital Subscriber Line,DSL)、数字电缆、直接电缆连接;和/或另一数据连接/网络;和/或经由无线接口,如,针对蜂窝网络、无线局域网(Wireless Local Area Network,WLAN)、诸如DVB-H网络的数字电视网络、卫星网络、AM-FM广播发送器;和/或另一终端设备的被设置成接收/发送通信信号的装置;和/或物联网(Internet of Things,IoT)设备。被设置成通过无线接口通信的终端设备可以被称为“无线通信终端”、“无线终端”或“移动终端”。移动终端的示例包括但不限于卫星或蜂窝电话;可以组合蜂窝无线电电话与数据处理、传真以及数据通信能力的个人通信系统(Personal Communications System,PCS)终端;可以包括无线电电话、寻呼机、因特网/内联网接入、Web浏览器、记事簿、日历、北斗卫星导航系统(BeiDou Navigation Satellite System,BDS)以及全球定位系统(Global Positioning System,GPS)接收器的PDA;以及常规膝上型和/或掌上型接收器或包括无线电电话收发器的其它电子装置。终端设备可以指接入终端、用户设备(User Equipment,UE)、用户单元、用户站、移动站、移动台、远方站、远程终端、移动设备、用户终端、终端、无线通信设备、用户代理或用户装置。接入终端可以是蜂窝电话、无绳电话、会话启动协议(Session Initiation Protocol,SIP)电话、无线本地环路(Wireless Local Loop,WLL)站、个人数字处理(Personal Digital Assistant,PDA)、具有无线通信功能的手持设备、计算设备或连接到无线调制解调器的其它处理设备、车载设备、可穿戴设备、5G网络中的终端设备或者未来演进的PLMN中的终端设备等。
该无线通信系统100还包括与接入网设备进行通信的核心网设备130。可选地,该核心网设备130可以是5G核心网设备,例如,接入与移动性管理功能(Access and Mobility Management Function,AMF),负责接入和移动性管理,具有对用户进行认证、切换、位置更新等功能。又例如,会话管理功能(Session Management Function,SMF),负责会话管理,包括分组数据单元(Packet Data Unit,PDU)会话的建立、修改、释放等。又例如,用户面功能(User Plane Function,UPF),负责用户数据的转发。
可选地,终端设备之间可以进行终端直连(Device to Device,D2D)通信。
图1示例性地示出了一个接入网设备、一个核心网设备和两个终端设备,可选地,该无线通信系统100可以包括多个接入网设备并且每个接入网设备的覆盖范围内可以包括其它数量的终端设备,本申请实施例对此不做限定。
可选地,该无线通信系统100还可以包括移动管理实体(Mobile Management Entity,MME)、统一数据管理(Unified Data Management,UDM),认证服务器功能(Authentication Server Function,AUSF),UPF,信令网关(Signaling Gateway,SGW)等其他网络实体,本申请实施例对此不作限定。图1示例性地示出了一个网络设备和两个终端设备,可选地,该通信系统100可以包括多个网络设备并且每个网络设备的覆盖范围内可以包括其它数量的终端设备,本申请实施例对此不做限定。
图2是根据本申请实施例的通信方法200的示意性流程图,其中,该方法可以由终端设备执行。该方法200包括以下内容中的至少部分内容。
在210中,终端设备获取接入第一网络的第一标识。
其中,第一网络为运营商部署的非公有的核心网,终端设备与PLMN有签约。
在220中,终端设备基于第一标识,接入第一网络。
图3是根据本申请实施例的通信方法300的示意性流程图,其中,该方法可以由核心网设备执行。该方法300包括以下内容中的至少部分内容。
在310中,核心网设备接收终端设备发送的第二请求消息。
其中,第二请求消息可以包括终端设备接入第一网络的第一标识和终端设备的标识,第一网络为运营商部署的非公有的核心网,终端设备与PLMN有签约。
在320中,核心网设备向终端设备发送第二请求响应消息。其中,第二请求响应消息用于指示是否允许终端设备接入第一网络。
图4是根据本申请实施例的通信方法400的示意性流程图,其中,该方法可以由第一设备执行。该方法400包括以下内容中的至少部分内容。
在410中,第一设备接收终端设备发送的第一请求消息。
其中,第一请求消息用于请求接入第一网络的第一标识,第一网络为运营商部署的非公有的核心网,终端设备与PLMN有签约。
在420中,第一设备向终端设备发送第一请求响应消息,该第一请求响应消息包括第一标识。
下面将结合图2-图4进一步描述本申请实施例的通信方法。应理解,下文描述的内容即可以应用于方法200,也可以应用于方法300和400。
可选地,在本申请实施例中,第一网络例如可以是类型a网络(Type-a Network,TAN)。
NR系统引入了垂直产业局域网(Vertical Local Access Network,VLAN)。VLAN网络又可以称为非公有网络,提供非公有服务。VLAN网络可以为TAN和类型b网络(Type-b Network,TBN),其中,TAN可以接入PLMN,为接入TAN的UE提供PLMN服务,TBN不接入PLMN,无法为接入TBN的UE提供PLMN服务。其中,TAN在进行数据传输时,可以把数据传输到外部网络,也可以只在TAN内部进行数据传输。然而,TBN在进行数据传输时,只能在TBN内部进行数据传输,和外部没有任何联系。TAN的UPF与PLMN网络外部的数据网络(Data Network,DN)之间可以通过接口N6进行连接。然而,TBN的UPF不会连接到PLMN网络外部的DN。
需要说明的是,本申请实施例对TAN和TBN的名称并不限定,也就是说,它们也可以表述为其他名称。
可选地,第一标识为可以接入第一网络的ID。例如,第一标识可以是验证码。其中,一个终端设备可以对应至少一个第一标识,一个第一标识也可以对应至少一个终端设备。
终端设备获取接入第一网络的第一标识的方式有很多种,本申请实施例对此不作具体限定。
在一种实现方式中,终端设备获取接入第一网络的第一标识,可以包括:终端设备向第一设备发送第一请求消息,其中,该第一请求消息可以用于请求第一标识,请求消息可以包括终端设备的标识。第一设备接收到第一请求消息后,可以为终端设备分配第一标识。之后,第一设备可以向终端设备发送第一请求响应消息,该第一请求响应消息包括第一标识。在终端设备接收到第一请求响应消息之后,终端设备可以基于第一请求响应消息确定第一标识。
可选地,终端设备的标识可以包括但不限于国际移动用户识别码(International Mobile Subscriber Identification Number,IMSI)、UE ID、国际移动设备识别码(International Mobile Equipment Identity,IMEI)。当终端设备为手机时,终端设备的标识也可以为终端设备 的手机号。
可选地,第一设备可以是核心网设备、应用服务器或用户设备。
可选地,第一设备接收到第一请求消息后,还可以确定第一标识的有效时长。例如,第一标识的有效时长为30s。此时,第一请求响应消息中可以包括第一标识的有效时长。
可选地,第一设备为终端设备分配第一标识后,可以保存终端设备上报的终端设备的标识和第一标识的对应关系。
在另一种实现方式中,当第一设备为应用服务器时,终端设备可以通过应用内部的交互获取第一标识。
作为一种示例,终端设备可以在一个应用程序上申请第一标识,即终端设备可以向应用服务器发送数据包,应用服务器给终端设备分配第一标识后,可以通过数据包将第一标识传送给终端设备。
在另一种实现方式中,终端设备可以通过用户设备之间的沟通获取第一标识。
比如,当第一标识为验证码时,第一用户设备可以告诉第二用户设备验证码,第二用户设备在获得验证码后,将验证码输入终端设备,从而终端设备可以获取到验证码。
可选地,本申请实施例的方法还可以包括:终端设备接收第一网络的接入网设备发送的广播消息,其中,该广播消息可以包括第一网络的标识。
可选地,广播消息还可以包括允许与PLMN有签约的终端设备接入第一网络的指示信息。
终端设备读取到第一网络的标识后,与保存的第一网络的标识进行比较,若读取的第一网络的标识与保存的第一网络的标识相同,则终端设备可以确定当前所处的位置有第一网络的覆盖,则终端设备可以向第一网络发起注册。为了描述方便,下述描述将终端设备保存的第一网络的标识称为第一网络的标识1。
可选地,第一网络的标识1可以是通过第一标识获得的,即第一标识中可以包括第一网络的标识1。
可选地,第一网络的标识1可以是预配置在终端设备上的。
可选地,第一网络的标识1可以是终端设备从某个应用程序上获取的。
终端设备与第一网络的接入网设备建立连接后,若第一标识在有效时长内,则终端设备可以向核心网设备发送第二请求消息,其中,该第二请求消息可以包括第一标识和终端设备的标识。核心网设备接收到第二请求消息后,可以确定是否允许终端设备接入第一网络。之后,核心网设备可以向终端设备发送第二请求响应消息,该第二请求响应消息用于指示是否允许终端设备接入第一网络。
若第二请求响应消息指示允许终端设备接入第一网络,则终端设备可以接入第一网络。
应理解,本申请实施例中的核心网设备为第一网络的核心网设备。
可选地,第二请求消息可以是注册请求消息,也可以是携带会话建立请求消息的非接入层(Non-Access Stratum,NAS)消息。
在一种可能的实施例中,核心网设备确定是否允许终端设备接入第一网络,可以包括:核心网设备根据第一标识和终端设备的标识,确定是否允许终端设备接入第一网络。
具体而言,核心网设备可以确定终端设备是否与PLMN有签约。若终端设备与PLMN有签约,则核心网设备可以向第一设备发送校验请求消息,该校验请求消息可以包括第一终端设备标识和第一标识。第一设备基于第一终端设备标识和第一标识,对终端设备进行校验,得到校验结果后,可以向核心网设备发送校验响应消息,该校验响应消息包括校验结果。之后,核心网设备可以基于校验结果,确定是否允许终端设备接入第一网络。
核心网设备确定终端设备是否与PLMN有签约,作为一种示例,可以包括:终端设备向核心网设备发送第一指示信息,其中,该第一指示信息可以用于指示终端设备与 PLMN有签约。核心网设备可以根据第一指示信息,确定终端设备与PLMN有签约。
可选地,第一指示信息可以承载于第二请求消息中。
可选地,第一指示信息可以通过至少一个比特指示终端设备是否与PLMN有签约。
示例性地,第一指示信息可以通过比特“0”指示终端设备与PLMN没有签约,通过比特“1”指示终端设备与PLMN有签约。
再示例性地,第一指示信息的比特数可以为多个,若多个比特位相同,则表示终端设备与PLMN有签约,若多个比特位中至少有两个比特位不同,则表示终端设备与PLMN没有签约。例如,“000”表示终端设备与PLMN有签约,“010”表示终端设备与PLMN没有签约。
应理解,本申请实施例中的具体的例子只是为了帮助本领域技术人员更好地理解本发明实施例,而非限制本申请实施例的范围。
可选地,第一指示信息可以通过第一参数指示终端设备是否与PLMN有签约。
示例性地,若第一指示信息中包括第一参数,则表示终端设备与PLMN有签约;若第一指示信息中不包括第一参数,则表示终端设备与PLMN没有签约。
需要说明的是,本申请实施例对第一参数不做具体限定,任何可以指示终端设备是否与PLMN有签约的参数都包含在本申请的保护范围内。
可选地,第一指示信息可以是终端设备的标识信息。即核心网设备可以通过识别终端设备的标识,确定终端设备是否与PLMN有签约。
在一种可能的实施例中,第一设备基于第一终端设备标识和第一标识,对终端设备进行校验,可以包括:第一设备保存第二标识和终端设备的标识,其中,第二标识为终端设备接入第一网络的标识。之后,第一设备可以确定包括的第二标识和终端设备的标识,是否与核心网设备上报的第一终端设备的标识和第一标识一致。若一致,则第一设备可以允许终端设备接入第一网络;若不一致,则第一设备不允许终端设备接入第一网络。
例如,第一设备保存的第二标识为ID 1,终端设备的标识为ID 2,ID 1与ID 2对应,核心网设备上报的第一标识为ID 1’,第一终端设备的标识为ID 2’,则第一设备校验是否保存有核心网设备上报的ID 1’和ID 2’。若第一设备确定ID 1’与ID 1相同、ID 2’与ID 2相同,即第一设备校验保存有核心网设备上报的ID 1’和ID 2’。则第一设备可以检测ID 1’和ID 2’的对应关系是否与ID 1和ID 2的对应关系一直,若一致,则第一设备确定终端设备可以接入第一网络;若不一致,则第一设备确定终端设备不可以接入第一网络。
若第一设备确定终端设备可以接入第一网络,则本申请实施例的方法还可以包括:第一设备确定终端设备接入第一网络的有效时长和/或允许终端设备接入的第一业务,其中,第一业务为终端设备接入的第一网络的业务。例如,第一业务可以是上网、发短信。
可选地,校验响应消息中可以包括终端设备接入第一网络的有效时长和/或允许终端设备接入的第一业务。
作为一种示例,第一设备可以根据当前时刻第一网络的业务量确定终端设备接入第一网络的有效时长。
例如,若当前时刻第一网络的业务量较大,则终端设备接入第一网络的有效时长可以较短,如1个小时;若当前时刻第一网络的业务量较小,则终端设备接入第一网络的有效时长可以较长,如2个小时。
作为又一示例,第一设备可以基于预设值确定终端设备接入第一网络的有效时长。
可选地,预设值可以是协议规定的。如协议规定终端设备接入第一网络的有效时长是2个小时。
可选地,校验响应消息中包括的允许终端设备接入的第一业务可以是第一业务的服务类型和标识。
可选地,该标识例如可以是应用名称,数据网络名称(Data Network Name,DNN)、 单一网络切片选择辅助信息(Single Network Slice Selection Assistance Information,S-NSSAI)。
本申请实施例的方法还可以包括:核心网设备向PLMN的UDM调用签约请求服务,其中,该签约请求服务用于请求终端设备的签约信息;核心网设备接收UDM调用的签约请求响应服务,该签约请求响应服务包含第三指示信息,其中,第三指示信息可以用于指示允许终端设备接入的第二业务,第二业务为终端设备通过第一网络接入的PLMN的业务。例如,第二业务可以是语音通话、长期演进语音承载(Voice over Long-Term Evolution,VoLTE)等。
可选地,核心网设备可以从终端设备的标识中获取PLMN的标识,再基于PLMN的标识向PLMN的UDM调用签约请求服务。
可选地,第三指示信息可以通过指示第二业务的服务类型和标识来指示允许终端设备接入的第二业务。
可选地,第二业务的服务标识例如可以是应用名称,DNN和S-NSSAI。
在核心网设备获取到允许终端设备接入的第一业务和第二业务后,可选地,本申请实施例的方法还可以包括:终端设备接收核心网设备发送的第二指示信息,其中,该第二指示信息用于指示允许终端设备接入的第一业务和/或第二业务。
可选地,第三指示信息可以承载于第二请求响应消息中。
可选地,核心网设备向终端设备发送第二请求响应消息后,可以向终端设备发送NAS消息,第三指示信息可以承载于该NAS消息中。
应理解,在本申请实施例中,“第一”、“第二”和“第三”仅仅为了区分不同的对象,但并不对本申请实施例的范围构成限制。
还应理解,本文中术语“和/或”,仅仅是一种描述关联对象的关联关系,表示可以存在三种关系,例如,A和/或B,可以表示:单独存在A,同时存在A和B,单独存在B这三种情况。
图5提供了本申请实施例的一个具体示意图。在图5中,第一网络为TAN,第一标识为第一ID,与PLMN有签约的终端设备为PLMN UE,PLMN UE的标识为IMSI,第一网络的接入网设备为无线接入网(Radio Access Network,RAN)-a,第一网络的核心网设备为AMF-a。
在510中,PLMN UE向第一设备发送请求接入TAN的第一ID的第一请求消息。其中,第一请求消息中包括IMSI。
第一设备接收到第一请求消息后,为PLMN UE分配第一ID和第一ID的有效时长,并保存第一ID与IMSI的对应关系。
在520中,第一设备向PLMN UE发送第一请求响应消息,该第一请求响应消息包括第一ID、第一ID的有效时长。
在530中,RAN-a广播TAN ID。
可选地,RAN-a还可以广播允许PLMN UE接入TAN的指示。
在540中,若第一ID仍在有效时长内,PLMN UE向AMF-a发送第二请求消息。
其中,第二请求消息中可以包括IMSI、第一ID、指示UE为PLMN UE的指示信息。
可选地,第二请求消息可以是注册请求消息,也可以是携带PDU会话建立请求消息的NAS消息。
若AMF-a识别出该UE为PLMN UE,则AMF-a对PLMN UE的接入进行校验,并从IMSI中获取PLMN ID。
在541中,AMF-a基于PLMN ID向该PLMN的UDM调用签约请求服务,并且UDM向核心网设备调用签约请求响应服务。
可选地,签约请求响应服务可以指示允许PLMN UE通过TAN接入PLMN服务和该服务的ID+DNN+S-NSSAI。
在550中,AMF-a向第一设备发送校验请求消息,该校验请求消息包括IMSI和第一ID。
第一设备接收到校验请求消息后,校验PLMN UE是否可以接入TAN,若PLMN UE可以接入TAN,则第一设备确定PLMN UE可以接入TAN的有效时长以及可以接入的TAN的服务类型和ID。
在560中,第一设备向AMF-a发送校验响应消息,其中,校验响应消息包括IMSI、第一ID、可以接入TAN的有效时长以及允许PLMN UE接入的TAN的服务类型和ID。
在570中,AMF-a向PLMN UE发送第二请求响应消息。
其中,第二请求响应消息包括第一ID、校验结果、可以接入TAN的有效时长、允许PLMN UE接入的TAN的服务类型和ID以及允许PLMN UE通过TAN接入的PLMN的服务类型和ID。
本申请实施例,当与PLMN有签约的终端设备进入运营商部署的非公有的核心网时,终端设备可以获得接入运营商部署的非公有的核心网的标识,从而可以基于获取的标识接入运营商部署的非公有的核心网。
应理解,在本申请的各种实施例中,上述各过程的序号的大小并不意味着执行顺序的先后,各过程的执行顺序应以其功能和内在逻辑确定,而不应对本申请实施例的实施过程构成任何限定。
上文中详细描述了根据本申请实施例的通信方法,下面将结合图6至图9,描述根据本申请实施例的装置,方法实施例所描述的技术特征适用于以下装置实施例。
图6示出了本申请实施例的终端设备600的示意性框图。如图6所示,该终端设备600包括:
处理单元610,用于获取接入第一网络的第一标识,第一网络为运营商部署的非公有的核心网,该终端设备600与PLMN有签约。
该处理单元610还用于,基于第一标识,接入该第一网络。
可选地,在本申请实施例中,该终端设备600还包括:通信单元620,用于向第一设备发送第一请求消息,该第一请求消息用于请求第一标识,该请求消息包括该终端设备600的标识;
该通信单元620还用于,接收第一设备发送的第一请求响应消息,该第一请求响应消息包括第一标识。
可选地,在本申请实施例中,第一请求响应消息还包括第一标识的有效时长。
可选地,在本申请实施例中,第一设备为核心网设备、应用服务器或用户设备。
可选地,在本申请实施例中,该终端设备600还包括:通信单元620,用于向核心网设备发送第二请求消息,该第二请求消息包括第一标识和该终端设备600的标识;
该通信单元620还用于,接收核心网设备发送的第二请求响应消息,该第二请求响应消息用于指示是否允许该终端设备600接入第一网络。
可选地,在本申请实施例中,第二请求消息还包括第一指示信息,该第一指示信息用于指示该终端设备600与PLMN有签约。
可选地,在本申请实施例中,第二请求响应消息包括该终端设备600接入所述第一网络的有效时长。
可选地,在本申请实施例中,该终端设备600还包括:通信单元620,用于接收核心网设备发送的第二指示信息,该第二指示信息用于指示允许该终端设备600接入的第一业务和/或第二业务,其中,第一业务为该终端设备600接入的第一网络的业务,第二业务为该终端设备600通过第一网络接入的PLMN的业务。
可选地,在本申请实施例中,核心网设备为第一网络的核心网设备。
应理解,该终端设备600可对应于方法200中的终端设备,可以实现该方法200中的终端设备的相应操作,为了简洁,在此不再赘述。
图7示出了本申请实施例的核心网设备700的示意性框图。如图7所示,该核心网设备700包括:
通信单元710,用于接收终端设备发送的第二请求消息,该第二请求消息包括终端设备接入第一网络的第一标识和终端设备的标识,第一网络为运营商部署的非公有的核心网,终端设备与PLMN有签约。
该通信单元710还用于,向终端设备发送第二请求响应消息,该第二请求响应消息用于指示是否允许终端设备接入第一网络。
可选地,在本申请实施例中,该核心网设备700还包括:处理单元720,用于根据第一标识和终端设备的标识,确定是否允许终端设备接入第一网络。
可选地,在本申请实施例中,该通信单元710具体用于:向第一设备发送校验请求消息,该校验请求消息包括第一终端设备标识和第一标识;
接收第一设备发送的校验响应消息,该校验响应消息包括是否允许终端设备接入第一网络的校验结果;
该处理单元720具体用于:基于校验结果,确定是否允许终端设备接入第一网络。
可选地,在本申请实施例中,该校验响应消息还包括终端设备接入第一网络的有效时长和/或允许终端设备接入的第一业务,其中,第一业务为终端设备接入的第一网络的业务。
可选地,在本申请实施例中,第一设备为核心网设备、应用服务器或用户设备。
可选地,在本申请实施例中,该核心网设备700还包括:处理单元720,用于确定终端设备是否与PLMN有签约。
可选地,在本申请实施例中,该处理单元720具体用于:基于第一指示信息,确定终端设备是否与PLMN有签约,该第一指示信息用于指示终端设备与PLMN有签约。
可选地,在本申请实施例中,该第一指示信息为终端设备的标识信息。
可选地,在本申请实施例中,该核心网设备700还包括:处理单元720,用于向PLMN的UDM调用签约请求服务,该签约请求服务用于请求终端设备的签约信息;
该通信单元710还用于:接收UDM调用的签约请求响应服务,该签约请求响应服务包含第三指示信息,该第三指示信息用于指示允许终端设备接入的第二业务,第二业务为终端设备通过第一网络接入的PLMN的业务。
可选地,在本申请实施例中,该通信单元710还用于:向终端设备发送第二指示信息,该第二指示信息用于指示允许终端设备接入的第一业务和/或第二业务,其中,第一业务为终端设备接入的第一网络的业务,第二业务为终端设备通过第一网络接入的PLMN的业务。
可选地,在本申请实施例中,该第二请求响应消息包括终端设备接入第一网络的有效时长。
可选地,在本申请实施例中,该核心网设备700为第一网络的核心网设备。
应理解,该核心网设备700可对应于方法400中的核心网设备,可以实现该方法400中的核心网设备的相应操作,为了简洁,在此不再赘述。
图8示出了本申请实施例的通信设备800的示意性框图,该通信设备800为本申请实施例的第一设备。如图8所示,该通信设备800包括:
通信单元810,用于接收终端设备发送的第一请求消息,该第一请求消息用于请求接入第一网络的第一标识,第一网络为运营商部署的非公有的核心网,终端设备与PLMN有签约。
该通信单元810还用于,向终端设备发送第一请求响应消息,该第一请求响应消息包括第一标识。
可选地,在本申请实施例中,该第一请求响应消息还包括第一标识的有效时长。
可选地,在本申请实施例中,该通信单元810还用于:接收核心网设备发送的校验 请求消息,该校验请求消息包括第一终端设备标识和第一标识;
该通信设备810还包括:处理单元820,用于基于第一终端设备标识和第一标识,对终端设备进行校验,得到校验结果;
该处理单元820还用于,基于校验结果,确定是否允许终端设备接入第一网络。
可选地,在本申请实施例中,该第一请求消息包括终端设备的标识,该处理单元820还用于:保存第二标识和终端设备的标识,其中,第二标识为终端设备接入第一网络的标识。
可选地,在本申请实施例中,该处理单元820具体用于:确定保存的第二标识和终端设备的标识,是否与核心网设备上报的第一终端设备标识和第一标识一致;
若一致,允许终端设备接入第一网络;若不一致,不允许终端设备接入第一网络。
可选地,在本申请实施例中,若该处理单元820确定允许终端设备接入第一网络,该处理单元820还用于:确定终端设备接入第一网络的有效时长。
可选地,在本申请实施例中,该通信单元810还用于:向核心网设备发送校验响应消息,该校验响应消息包括校验结果和终端设备接入第一网络的有效时长。
可选地,在本申请实施例中,该校验响应消息还包括允许终端设备接入的第一业务,其中,第一业务为终端设备接入的第一网络的业务。
可选地,在本申请实施例中,该核心网设备为第一网络的核心网设备。
可选地,在本申请实施例中,该第一设备为核心网设备、应用服务器或用户设备。
应理解,该通信设备800可对应于方法500中的通信设备,可以实现该方法500中的通信设备的相应操作,为了简洁,在此不再赘述。
图9是本申请实施例提供的一种通信设备900示意性结构图。图9所示的通信设备900包括处理器910,处理器910可以从存储器中调用并运行计算机程序,以实现本申请实施例中的方法。
可选地,如图9所示,通信设备900还可以包括存储器920。其中,处理器910可以从存储器920中调用并运行计算机程序,以实现本申请实施例中的方法。
其中,存储器920可以是独立于处理器910的一个单独的器件,也可以集成在处理器910中。
可选地,如图9所示,通信设备900还可以包括收发器930,处理器910可以控制该收发器930与其他设备进行通信,具体地,可以向其他设备发送信息或数据,或接收其他设备发送的信息或数据。
其中,收发器930可以包括发射机和接收机。收发器930还可以进一步包括天线,天线的数量可以为一个或多个。
可选地,该通信设备900具体可为本申请实施例的终端设备,并且该通信设备900可以实现本申请实施例的各个方法中由终端设备实现的相应流程,为了简洁,在此不再赘述。
可选地,该通信设备900具体可为本申请实施例的核心网设备,并且该通信设备900可以实现本申请实施例的各个方法中由核心网设备实现的相应流程,为了简洁,在此不再赘述。
可选地,该通信设备900具体可为本申请实施例的第一设备,并且该通信设备900可以实现本申请实施例的各个方法中由第一设备实现的相应流程,为了简洁,在此不再赘述。
图10是本申请实施例的芯片的示意性结构图。图10所示的芯片1000包括处理器1010,处理器1010可以从存储器中调用并运行计算机程序,以实现本申请实施例中的方法。
可选地,如图10所示,芯片1000还可以包括存储器1020。其中,处理器1010可以从存储器1020中调用并运行计算机程序,以实现本申请实施例中的方法。
其中,存储器1020可以是独立于处理器1010的一个单独的器件,也可以集成在处理器1010中。
可选地,该芯片1000还可以包括输入接口1030。其中,处理器1010可以控制该输入接口1030与其他设备或芯片进行通信,具体地,可以获取其他设备或芯片发送的信息或数据。
可选地,该芯片1000还可以包括输出接口1040。其中,处理器1010可以控制该输出接口1040与其他设备或芯片进行通信,具体地,可以向其他设备或芯片输出信息或数据。
可选地,该芯片可应用于本申请实施例中的终端设备,并且该芯片可以实现本申请实施例的各个方法中由终端设备实现的相应流程,为了简洁,在此不再赘述。
可选地,该芯片可应用于本申请实施例中的核心网设备,并且该芯片可以实现本申请实施例的各个方法中由核心网设备实现的相应流程,为了简洁,在此不再赘述。
可选地,该芯片可应用于本申请实施例中的第一设备,并且该芯片可以实现本申请实施例的各个方法中由第一设备实现的相应流程,为了简洁,在此不再赘述。
应理解,本申请实施例提到的芯片还可以称为系统级芯片,系统芯片,芯片系统或片上系统芯片等。
应理解,本申请实施例的处理器可能是一种集成电路芯片,具有信号的处理能力。在实现过程中,上述方法实施例的各步骤可以通过处理器中的硬件的集成逻辑电路或者软件形式的指令完成。上述的处理器可以是通用处理器、数字信号处理器(Digital Signal Processor,DSP)、专用集成电路(Application Specific Integrated Circuit,ASIC)、现成可编程门阵列(Field Programmable Gate Array,FPGA)或者其他可编程逻辑器件、分立门或者晶体管逻辑器件、分立硬件组件。可以实现或者执行本申请实施例中的公开的各方法、步骤及逻辑框图。通用处理器可以是微处理器或者该处理器也可以是任何常规的处理器等。结合本申请实施例所公开的方法的步骤可以直接体现为硬件译码处理器执行完成,或者用译码处理器中的硬件及软件模块组合执行完成。软件模块可以位于随机存储器,闪存、只读存储器,可编程只读存储器或者电可擦写可编程存储器、寄存器等本领域成熟的存储介质中。该存储介质位于存储器,处理器读取存储器中的信息,结合其硬件完成上述方法的步骤。
可以理解,本申请实施例中的存储器可以是易失性存储器或非易失性存储器,或可包括易失性和非易失性存储器两者。其中,非易失性存储器可以是只读存储器(Read-Only Memory,ROM)、可编程只读存储器(Programmable ROM,PROM)、可擦除可编程只读存储器(Erasable PROM,EPROM)、电可擦除可编程只读存储器(Electrically EPROM,EEPROM)或闪存。易失性存储器可以是随机存取存储器(Random Access Memory,RAM),其用作外部高速缓存。通过示例性但不是限制性说明,许多形式的RAM可用,例如静态随机存取存储器(Static RAM,SRAM)、动态随机存取存储器(Dynamic RAM,DRAM)、同步动态随机存取存储器(Synchronous DRAM,SDRAM)、双倍数据速率同步动态随机存取存储器(Double Data Rate SDRAM,DDR SDRAM)、增强型同步动态随机存取存储器(Enhanced SDRAM,ESDRAM)、同步连接动态随机存取存储器(Synchlink DRAM,SLDRAM)和直接内存总线随机存取存储器(Direct Rambus RAM,DR RAM)。应注意,本文描述的系统和方法的存储器旨在包括但不限于这些和任意其它适合类型的存储器。
应理解,上述存储器为示例性但不是限制性说明,例如,本申请实施例中的存储器还可以是静态随机存取存储器(static RAM,SRAM)、动态随机存取存储器(dynamic RAM,DRAM)、同步动态随机存取存储器(synchronous DRAM,SDRAM)、双倍数据速率同步动态随机存取存储器(double data rate SDRAM,DDR SDRAM)、增强型同步动态随机存取存储器(enhanced SDRAM,ESDRAM)、同步连接动态随机存取存储器 (synch link DRAM,SLDRAM)以及直接内存总线随机存取存储器(Direct Rambus RAM,DR RAM)等等。也就是说,本申请实施例中的存储器旨在包括但不限于这些和任意其它适合类型的存储器。
图11是本申请实施例提供的一种通信系统1100的示意性框图。如图11所示,该通信系统1100包括终端设备1110、核心网设备1120和第一设备1130。
其中,该终端设备1110可以用于实现上述方法中由终端设备实现的相应的功能,该核心网设备1120可以用于实现上述方法中由核心网设备实现的相应的功能,以及该第一设备1130可以用于实现上述方法中由第一设备实现的相应的功能,为了简洁,在此不再赘述。
本申请实施例还提供了一种计算机可读存储介质,用于存储计算机程序。
可选地,该计算机可读存储介质可应用于本申请实施例中的终端设备,并且该计算机程序使得计算机执行本申请实施例的各个方法中由终端设备实现的相应流程,为了简洁,在此不再赘述。
可选地,该计算机可读存储介质可应用于本申请实施例中的核心网设备,并且该计算机程序使得计算机执行本申请实施例的各个方法中由核心网设备实现的相应流程,为了简洁,在此不再赘述。
可选地,该计算机可读存储介质可应用于本申请实施例中的第一设备,并且该计算机程序使得计算机执行本申请实施例的各个方法中由第一设备实现的相应流程,为了简洁,在此不再赘述。
本申请实施例还提供了一种计算机程序产品,包括计算机程序指令。
可选地,该计算机程序产品可应用于本申请实施例中的终端设备,并且该计算机程序指令使得计算机执行本申请实施例的各个方法中由终端设备实现的相应流程,为了简洁,在此不再赘述。
可选地,该计算机程序产品可应用于本申请实施例中的核心网设备,并且该计算机程序指令使得计算机执行本申请实施例的各个方法中由核心网设备实现的相应流程,为了简洁,在此不再赘述。
可选地,该计算机程序产品可应用于本申请实施例中的第一设备,并且该计算机程序指令使得计算机执行本申请实施例的各个方法中由第一设备实现的相应流程,为了简洁,在此不再赘述。
本申请实施例还提供了一种计算机程序。
可选地,该计算机程序可应用于本申请实施例中的终端设备,当该计算机程序在计算机上运行时,使得计算机执行本申请实施例的各个方法中由终端设备实现的相应流程,为了简洁,在此不再赘述。
可选的,该计算机程序可应用于本申请实施例中的核心网设备,当该计算机程序在计算机上运行时,使得计算机执行本申请实施例的各个方法中由核心网设备实现的相应流程,为了简洁,在此不再赘述。
可选的,该计算机程序可应用于本申请实施例中的第一设备,当该计算机程序在计算机上运行时,使得计算机执行本申请实施例的各个方法中由第一设备实现的相应流程,为了简洁,在此不再赘述。
本领域普通技术人员可以意识到,结合本文中所公开的实施例描述的各示例的单元及算法步骤,能够以电子硬件、或者计算机软件和电子硬件的结合来实现。这些功能究竟以硬件还是软件方式来执行,取决于技术方案的特定应用和设计约束条件。专业技术人员可以对每个特定的应用来使用不同方法来实现所描述的功能,但是这种实现不应认为超出本申请的范围。
所属领域的技术人员可以清楚地了解到,为描述的方便和简洁,上述描述的系统、装置和单元的具体工作过程,可以参考前述方法实施例中的对应过程,在此不再赘述。
在本申请所提供的几个实施例中,应该理解到,所揭露的系统、装置和方法,可以通过其它的方式实现。例如,以上所描述的装置实施例仅仅是示意性的,例如,所述单元的划分,仅仅为一种逻辑功能划分,实际实现时可以有另外的划分方式,例如多个单元或组件可以结合或者可以集成到另一个系统,或一些特征可以忽略,或不执行。另一点,所显示或讨论的相互之间的耦合或直接耦合或通信连接可以是通过一些接口,装置或单元的间接耦合或通信连接,可以是电性,机械或其它的形式。
所述作为分离部件说明的单元可以是或者也可以不是物理上分开的,作为单元显示的部件可以是或者也可以不是物理单元,即可以位于一个地方,或者也可以分布到多个网络单元上。可以根据实际的需要选择其中的部分或者全部单元来实现本实施例方案的目的。
另外,在本申请各个实施例中的各功能单元可以集成在一个处理单元中,也可以是各个单元单独物理存在,也可以两个或两个以上单元集成在一个单元中。
所述功能如果以软件功能单元的形式实现并作为独立的产品销售或使用时,可以存储在一个计算机可读取存储介质中。基于这样的理解,本申请的技术方案本质上或者说对现有技术做出贡献的部分或者该技术方案的部分可以以软件产品的形式体现出来,该计算机软件产品存储在一个存储介质中,包括若干指令用以使得一台计算机设备(可以是个人计算机,服务器,或者网络设备等)执行本申请各个实施例所述方法的全部或部分步骤。而前述的存储介质包括:U盘、移动硬盘、只读存储器(Read-Only Memory,)ROM、随机存取存储器(Random Access Memory,RAM)、磁碟或者光盘等各种可以存储程序代码的介质。
以上所述,仅为本申请的具体实施方式,但本申请的保护范围并不局限于此,任何熟悉本技术领域的技术人员在本申请揭露的技术范围内,可轻易想到变化或替换,都应涵盖在本申请的保护范围之内。因此,本申请的保护范围应所述以权利要求的保护范围为准。

Claims (77)

  1. 一种通信方法,其特征在于,所述方法包括:
    终端设备获取接入第一网络的第一标识,所述第一网络为运营商部署的非公有的核心网,所述终端设备与公共陆地移动网络PLMN有签约;
    所述终端设备基于所述第一标识,接入所述第一网络。
  2. 根据权利要求1所述的方法,其特征在于,所述终端设备获取接入第一网络的第一标识,包括:
    所述终端设备向第一设备发送第一请求消息,所述第一请求消息用于请求所述第一标识,所述请求消息包括所述终端设备的标识;
    所述终端设备接收所述第一设备发送的第一请求响应消息,所述第一请求响应消息包括所述第一标识。
  3. 根据权利要求2所述的方法,其特征在于,所述第一请求响应消息还包括所述第一标识的有效时长。
  4. 根据权利要求2或3所述的方法,其特征在于,所述第一设备为核心网设备、应用服务器或用户设备。
  5. 根据权利要求1至4中任一项所述的方法,其特征在于,所述终端设备基于所述第一标识,接入所述第一网络,包括:
    所述终端设备向核心网设备发送第二请求消息,所述第二请求消息包括所述第一标识和所述终端设备的标识;
    所述终端设备接收所述核心网设备发送的第二请求响应消息,所述第二请求响应消息用于指示是否允许所述终端设备接入所述第一网络。
  6. 根据权利要求5所述的方法,其特征在于,所述第二请求消息还包括第一指示信息,所述第一指示信息用于指示所述终端设备与PLMN有签约。
  7. 根据权利要求5或6所述的方法,其特征在于,所述第二请求响应消息包括所述终端设备接入所述第一网络的有效时长。
  8. 根据权利要求1至7中任一项所述的方法,其特征在于,所述方法还包括:
    所述终端设备接收核心网设备发送的第二指示信息,所述第二指示信息用于指示允许所述终端设备接入的第一业务和/或第二业务,其中,所述第一业务为所述终端设备接入的所述第一网络的业务,所述第二业务为所述终端设备通过所述第一网络接入的PLMN的业务。
  9. 根据权利要求5至8中任一项所述的方法,其特征在于,所述核心网设备为所述第一网络的核心网设备。
  10. 一种通信方法,其特征在于,所述方法包括:
    核心网设备接收终端设备发送的第二请求消息,所述第二请求消息包括所述终端设备接入第一网络的第一标识和所述终端设备的标识,所述第一网络为运营商部署的非公有的核心网,所述终端设备与公共陆地移动网络PLMN有签约;
    所述核心网设备向所述终端设备发送第二请求响应消息,所述第二请求响应消息用于指示是否允许所述终端设备接入所述第一网络。
  11. 根据权利要求10所述的方法,其特征在于,在所述核心网设备向所述终端设备发送第二请求响应消息之前,所述方法还包括:
    所述核心网设备根据所述第一标识和所述终端设备的标识,确定是否允许所述终端设备接入所述第一网络。
  12. 根据权利要求11所述的方法,其特征在于,所述核心网设备根据所述第一标识和所述终端设备的标识,确定是否允许所述终端设备接入所述第一网络,包括:
    所述核心网设备向第一设备发送校验请求消息,所述校验请求消息包括第一终端设 备标识和所述第一标识;
    所述核心网设备接收所述第一设备发送的校验响应消息,所述校验响应消息包括是否允许所述终端设备接入所述第一网络的校验结果;
    所述核心网设备基于所述校验结果,确定是否允许所述终端设备接入所述第一网络。
  13. 根据权利要求12所述的方法,其特征在于,所述校验响应消息还包括所述终端设备接入所述第一网络的有效时长和/或允许所述终端设备接入的第一业务,其中,所述第一业务为所述终端设备接入的所述第一网络的业务。
  14. 根据权利要求12或13所述的方法,其特征在于,所述第一设备为核心网设备、应用服务器或用户设备。
  15. 根据权利要求10至14中任一项所述的方法,其特征在于,所述方法还包括:
    所述核心网设备确定所述终端设备是否与PLMN有签约。
  16. 根据权利要求15所述的方法,其特征在于,所述核心网设备确定所述终端设备是否与PLMN有签约,包括:
    所述核心网设备基于第一指示信息,确定所述终端设备是否与PLMN有签约,所述第一指示信息用于指示所述终端设备与PLMN有签约。
  17. 根据权利要求16所述的方法,其特征在于,所述第一指示信息为所述终端设备的标识信息。
  18. 根据权利要求10至17中任一项所述的方法,其特征在于,所述方法还包括:
    所述核心网设备向PLMN的统一数据管理UDM调用签约请求服务,所述签约请求服务用于请求所述终端设备的签约信息;
    所述核心网设备接收所述UDM调用的签约请求响应服务,所述签约请求响应服务包含第三指示信息,所述第三指示信息用于指示允许所述终端设备接入的第二业务,所述第二业务为所述终端设备通过所述第一网络接入的PLMN的业务。
  19. 根据权利要求10至18中任一项所述的方法,其特征在于,所述方法还包括:
    所述核心网设备向所述终端设备发送第二指示信息,所述第二指示信息用于指示允许所述终端设备接入的第一业务和/或第二业务,其中,所述第一业务为所述终端设备接入的所述第一网络的业务,所述第二业务为所述终端设备通过所述第一网络接入的PLMN的业务。
  20. 根据权利要求10至19中任一项所述的方法,其特征在于,所述第二请求响应消息包括所述终端设备接入所述第一网络的有效时长。
  21. 根据权利要求10至20中任一项所述的方法,其特征在于,所述核心网设备为所述第一网络的核心网设备。
  22. 一种通信方法,其特征在于,所述方法包括:
    第一设备接收终端设备发送的第一请求消息,所述第一请求消息用于请求接入第一网络的第一标识,所述第一网络为运营商部署的非公有的核心网,所述终端设备与公共陆地移动网络PLMN有签约;
    所述第一设备向所述终端设备发送第一请求响应消息,所述第一请求响应消息包括所述第一标识。
  23. 根据权利要求22所述的方法,其特征在于,所述第一请求响应消息还包括所述第一标识的有效时长。
  24. 根据权利要求22或23所述的方法,其特征在于,所述方法还包括:
    所述第一设备接收核心网设备发送的校验请求消息,所述校验请求消息包括第一终端设备标识和所述第一标识;
    所述第一设备基于所述第一终端设备标识和所述第一标识,对所述终端设备进行校验,得到校验结果;
    所述第一设备基于所述校验结果,确定是否允许所述终端设备接入所述第一网络。
  25. 根据权利要求24所述的方法,其特征在于,所述第一请求消息包括所述终端设备的标识,所述方法还包括:
    所述第一设备保存第二标识和所述终端设备的标识,其中,所述第二标识为所述终端设备接入所述第一网络的标识。
  26. 根据权利要求25所述的方法,其特征在于,所述第一设备基于所述第一终端设备标识和所述第一标识,对所述终端设备进行校验,包括:
    所述第一设备确定保存的所述第二标识和终端设备的标识,是否与所述核心网设备上报的所述第一终端设备标识和所述第一标识一致;
    若一致,所述第一设备允许所述终端设备接入所述第一网络;
    若不一致,所述第一设备不允许所述终端设备接入所述第一网络。
  27. 根据权利要求24至26中任一项所述的方法,其特征在于,若所述第一设备确定允许所述终端设备接入所述第一网络,所述方法还包括:
    所述第一设备确定所述终端设备接入所述第一网络的有效时长。
  28. 根据权利要求27所述的方法,其特征在于,所述方法还包括:
    所述第一设备向所述核心网设备发送校验响应消息,所述校验响应消息包括所述校验结果。
  29. 根据权利要求28所述的方法,其特征在于,所述校验响应消息还包括所述终端设备接入所述第一网络的有效时长和/或允许所述终端设备接入的第一业务,其中,所述第一业务为所述终端设备接入的所述第一网络的业务。
  30. 根据权利要求24至29中任一项所述的方法,其特征在于,所述核心网设备为所述第一网络的核心网设备。
  31. 根据权利要求22至30中任一项所述的方法,其特征在于,所述第一设备为核心网设备、应用服务器或用户设备。
  32. 一种终端设备,其特征在于,包括:
    处理单元,用于获取接入第一网络的第一标识,所述第一网络为运营商部署的非公有的核心网,所述终端设备与公共陆地移动网络PLMN有签约;
    所述处理单元还用于,基于所述第一标识,接入所述第一网络。
  33. 根据权利要求32所述的终端设备,其特征在于,所述终端设备还包括:
    通信单元,用于向第一设备发送第一请求消息,所述第一请求消息用于请求所述第一标识,所述请求消息包括所述终端设备的标识;
    所述通信单元还用于,接收所述第一设备发送的第一请求响应消息,所述第一请求响应消息包括所述第一标识。
  34. 根据权利要求33所述的终端设备,其特征在于,所述第一请求响应消息还包括所述第一标识的有效时长。
  35. 根据权利要求33或34所述的终端设备,其特征在于,所述第一设备为核心网设备、应用服务器或用户设备。
  36. 根据权利要求32至35中任一项所述的终端设备,其特征在于,所述终端设备还包括:
    通信单元,用于向核心网设备发送第二请求消息,所述第二请求消息包括所述第一标识和所述终端设备的标识;
    所述通信单元还用于,接收所述核心网设备发送的第二请求响应消息,所述第二请求响应消息用于指示是否允许所述终端设备接入所述第一网络。
  37. 根据权利要求36所述的终端设备,其特征在于,所述第二请求消息还包括第一指示信息,所述第一指示信息用于指示所述终端设备与PLMN有签约。
  38. 根据权利要求36或37所述的终端设备,其特征在于,所述第二请求响应消息包括所述终端设备接入所述第一网络的有效时长。
  39. 根据权利要求32至38中任一项所述的终端设备,其特征在于,所述终端设备还包括:
    通信单元,用于接收核心网设备发送的第二指示信息,所述第二指示信息用于指示允许所述终端设备接入的第一业务和/或第二业务,其中,所述第一业务为所述终端设备接入的所述第一网络的业务,所述第二业务为所述终端设备通过所述第一网络接入的PLMN的业务。
  40. 根据权利要求36至39中任一项所述的终端设备,其特征在于,所述核心网设备为所述第一网络的核心网设备。
  41. 一种核心网设备,其特征在于,包括:
    通信单元,用于接收终端设备发送的第二请求消息,所述第二请求消息包括所述终端设备接入第一网络的第一标识和所述终端设备的标识,所述第一网络为运营商部署的非公有的核心网,所述终端设备与公共陆地移动网络PLMN有签约;
    所述通信单元还用于,向所述终端设备发送第二请求响应消息,所述第二请求响应消息用于指示是否允许所述终端设备接入所述第一网络。
  42. 根据权利要求42所述的核心网设备,其特征在于,所述核心网设备还包括:
    处理单元,用于根据所述第一标识和所述终端设备的标识,确定是否允许所述终端设备接入所述第一网络。
  43. 根据权利要求42所述的核心网设备,其特征在于,所述通信单元具体用于:
    向第一设备发送校验请求消息,所述校验请求消息包括第一终端设备标识和所述第一标识;
    接收所述第一设备发送的校验响应消息,所述校验响应消息包括是否允许所述终端设备接入所述第一网络的校验结果;
    所述处理单元具体用于:
    基于所述校验结果,确定是否允许所述终端设备接入所述第一网络。
  44. 根据权利要求43所述的核心网设备,其特征在于,所述校验响应消息还包括所述终端设备接入所述第一网络的有效时长和/或允许所述终端设备接入的第一业务,其中,所述第一业务为所述终端设备接入的所述第一网络的业务。
  45. 根据权利要求43或44所述的核心网设备,其特征在于,所述第一设备为核心网设备、应用服务器或用户设备。
  46. 根据权利要求41至45中任一项所述的核心网设备,其特征在于,所述核心网设备还包括:
    处理单元,用于确定所述终端设备是否与PLMN有签约。
  47. 根据权利要求46所述的核心网设备,其特征在于,所述处理单元具体用于:
    基于第一指示信息,确定所述终端设备是否与PLMN有签约,所述第一指示信息用于指示所述终端设备与PLMN有签约。
  48. 根据权利要求47所述的核心网设备,其特征在于,所述第一指示信息为所述终端设备的标识信息。
  49. 根据权利要求41至48中任一项所述的核心网设备,其特征在于,所述核心网设备还包括:
    处理单元,用于向PLMN的统一数据管理UDM调用签约请求服务,所述签约请求服务用于请求所述终端设备的签约信息;
    所述通信单元还用于:
    接收所述UDM调用的签约请求响应服务,所述签约请求响应服务包含第三指示信息,所述第三指示信息用于指示允许所述终端设备接入的第二业务,所述第二业务为所述终端设备通过所述第一网络接入的PLMN的业务。
  50. 根据权利要求41至49中任一项所述的核心网设备,其特征在于,所述通信单 元还用于:
    向所述终端设备发送第二指示信息,所述第二指示信息用于指示允许所述终端设备接入的第一业务和/或第二业务,其中,所述第一业务为所述终端设备接入的所述第一网络的业务,所述第二业务为所述终端设备通过所述第一网络接入的PLMN的业务。
  51. 根据权利要求41至50中任一项所述的核心网设备,其特征在于,所述第二请求响应消息包括所述终端设备接入所述第一网络的有效时长。
  52. 根据权利要求41至51中任一项所述的核心网设备,其特征在于,所述核心网设备为所述第一网络的核心网设备。
  53. 一种通信设备,其特征在于,所述通信设备为第一设备,包括:
    通信单元,用于接收终端设备发送的第一请求消息,所述第一请求消息用于请求接入第一网络的第一标识,所述第一网络为运营商部署的非公有的核心网,所述终端设备与公共陆地移动网络PLMN有签约;
    所述通信单元还用于,向所述终端设备发送第一请求响应消息,所述第一请求响应消息包括所述第一标识。
  54. 根据权利要求53所述的通信设备,其特征在于,所述第一请求响应消息还包括所述第一标识的有效时长。
  55. 根据权利要求53或54所述的通信设备,其特征在于,所述通信单元还用于:
    接收核心网设备发送的校验请求消息,所述校验请求消息包括第一终端设备标识和所述第一标识;
    所述通信设备还包括:
    处理单元,用于基于所述第一终端设备标识和所述第一标识,对所述终端设备进行校验,得到校验结果;
    所述处理单元还用于,基于所述校验结果,确定是否允许所述终端设备接入所述第一网络。
  56. 根据权利要求55所述的通信设备,其特征在于,所述第一请求消息包括所述终端设备的标识,所述处理单元还用于:
    保存第二标识和所述终端设备的标识,其中,所述第二标识为所述终端设备接入所述第一网络的标识。
  57. 根据权利要求56所述的通信设备,其特征在于,所述处理单元具体用于:
    确定保存的所述第二标识和终端设备的标识,是否与所述核心网设备上报的所述第一终端设备标识和所述第一标识一致;
    若一致,允许所述终端设备接入所述第一网络;
    若不一致,不允许所述终端设备接入所述第一网络。
  58. 根据权利要求55至57中任一项所述的通信设备,其特征在于,若所述处理单元确定允许所述终端设备接入所述第一网络,所述处理单元还用于:
    确定所述终端设备接入所述第一网络的有效时长。
  59. 根据权利要求58所述的通信设备,其特征在于,所述通信单元还用于:
    向所述核心网设备发送校验响应消息,所述校验响应消息包括所述校验结果。
  60. 根据权利要求59所述的通信设备,其特征在于,所述校验响应消息还包括所述终端设备接入所述第一网络的有效时长和/或允许所述终端设备接入的第一业务,其中,所述第一业务为所述终端设备接入的所述第一网络的业务。
  61. 根据权利要求55至60中任一项所述的通信设备,其特征在于,所述核心网设备为所述第一网络的核心网设备。
  62. 根据权利要求53至61中任一项所述的通信设备,其特征在于,所述第一设备为核心网设备、应用服务器或用户设备。
  63. 一种终端设备,其特征在于,包括:处理器和存储器,所述存储器用于存储计 算机程序,所述处理器用于调用并运行所述存储器中存储的计算机程序,执行如权利要求1至9中任一项所述的方法。
  64. 一种核心网设备,其特征在于,包括:处理器和存储器,所述存储器用于存储计算机程序,所述处理器用于调用并运行所述存储器中存储的计算机程序,执行如权利要求10至21中任一项所述的方法。
  65. 一种通信设备,其特征在于,包括:处理器和存储器,所述存储器用于存储计算机程序,所述处理器用于调用并运行所述存储器中存储的计算机程序,执行如权利要求22至31中任一项所述的方法。
  66. 一种芯片,其特征在于,包括:处理器,用于从存储器中调用并运行计算机程序,使得安装有所述芯片的设备执行如权利要求1至9中任一项所述的方法。
  67. 一种芯片,其特征在于,包括:处理器,用于从存储器中调用并运行计算机程序,使得安装有所述芯片的设备执行如权利要求10至21中任一项所述的方法。
  68. 一种芯片,其特征在于,包括:处理器,用于从存储器中调用并运行计算机程序,使得安装有所述芯片的设备执行如权利要求22至31中任一项所述的方法。
  69. 一种计算机可读存储介质,其特征在于,用于存储计算机程序,所述计算机程序使得计算机执行如权利要求1至9中任一项所述的方法。
  70. 一种计算机可读存储介质,其特征在于,用于存储计算机程序,所述计算机程序使得计算机执行如权利要求10至21中任一项所述的方法。
  71. 一种计算机可读存储介质,其特征在于,用于存储计算机程序,所述计算机程序使得计算机执行如权利要求22至31中任一项所述的方法。
  72. 一种计算机程序产品,其特征在于,包括计算机程序指令,该计算机程序指令使得计算机执行如权利要求1至9中任一项所述的方法。
  73. 一种计算机程序产品,其特征在于,包括计算机程序指令,该计算机程序指令使得计算机执行如权利要求10至21中任一项所述的方法。
  74. 一种计算机程序产品,其特征在于,包括计算机程序指令,该计算机程序指令使得计算机执行如权利要求22至31中任一项所述的方法。
  75. 一种计算机程序,其特征在于,所述计算机程序使得计算机执行如权利要求1至9中任一项所述的方法。
  76. 一种计算机程序,其特征在于,所述计算机程序使得计算机执行如权利要求10至21中任一项所述的方法。
  77. 一种计算机程序,其特征在于,所述计算机程序使得计算机执行如权利要求22至31中任一项所述的方法。
PCT/CN2018/112924 2018-10-31 2018-10-31 通信方法和设备 WO2020087327A1 (zh)

Priority Applications (2)

Application Number Priority Date Filing Date Title
PCT/CN2018/112924 WO2020087327A1 (zh) 2018-10-31 2018-10-31 通信方法和设备
CN201880097268.8A CN112655182B (zh) 2018-10-31 2018-10-31 通信方法和设备

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/CN2018/112924 WO2020087327A1 (zh) 2018-10-31 2018-10-31 通信方法和设备

Publications (1)

Publication Number Publication Date
WO2020087327A1 true WO2020087327A1 (zh) 2020-05-07

Family

ID=70461930

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2018/112924 WO2020087327A1 (zh) 2018-10-31 2018-10-31 通信方法和设备

Country Status (2)

Country Link
CN (1) CN112655182B (zh)
WO (1) WO2020087327A1 (zh)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113676996A (zh) * 2021-08-11 2021-11-19 成都中科微信息技术研究院有限公司 一种基于dvb和5g融合组网的卫星终端注册方法、系统及终端
CN114268949A (zh) * 2021-11-16 2022-04-01 浙江大学 一种5g局域网的网络搭建方法
CN116250287A (zh) * 2020-07-31 2023-06-09 Oppo广东移动通信有限公司 设备接入认证的方法、终端设备和云平台
WO2023138304A1 (zh) * 2022-01-24 2023-07-27 华为技术有限公司 获取签约信息的方法和装置

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN116456353A (zh) * 2022-01-06 2023-07-18 维沃移动通信有限公司 托管网络接入处理方法、装置、终端及网络侧设备

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1893426A (zh) * 2005-07-08 2007-01-10 中国电信股份有限公司 实现私网视讯终端穿越防火墙的方法和系统
CN101009740A (zh) * 2007-01-17 2007-08-01 广州市高科通信技术股份有限公司 双pppoe实现数据与语音同时接入的系统及方法
US20120317637A1 (en) * 2011-06-08 2012-12-13 Zhe Huang Communication between private network and public network
CN103166864A (zh) * 2013-03-26 2013-06-19 杭州华三通信技术有限公司 一种私网vlan信息管理方法和设备

Family Cites Families (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101299870B (zh) * 2007-04-30 2011-04-20 华为技术有限公司 接入私有基站的控制方法、系统及装置
GB2472842B (en) * 2009-08-21 2012-06-27 Samsung Electronics Co Ltd A network entity, a wireless communication unit and methods for access to a remote private IP network and supporting therof
WO2016193783A1 (en) * 2015-05-29 2016-12-08 Nokia Technologies Oy Method and apparatus for implementing network-controlled peer-to-peer connectivity
CN104980993B (zh) * 2015-06-19 2017-05-17 广东欧珀移动通信有限公司 一种网络接入方法、移动通信终端、网络服务器及网络接入系统
EP3343963B1 (en) * 2015-08-26 2020-01-15 LG Electronics Inc. Method for obtaining operator network identification number of visited network
EP3799479B1 (en) * 2015-09-18 2023-06-21 Huawei Technologies Co., Ltd. Selection of a dedicated core network based on a service type
CN106612500A (zh) * 2015-10-23 2017-05-03 中兴通讯股份有限公司 一种邻近服务的监听业务控制方法和装置
WO2017082532A1 (ko) * 2015-11-09 2017-05-18 엘지전자 주식회사 방문 네트워크의 사업자 네트워크 식별번호 획득 방법
US9838865B2 (en) * 2016-02-10 2017-12-05 Qualcomm Incorporated Techniques for providing network access
CN111182539B (zh) * 2017-03-24 2023-04-07 华为技术有限公司 通信方法与设备
CN107623909B (zh) * 2017-09-30 2019-02-05 Oppo广东移动通信有限公司 配置信息获取、处理方法、装置和系统

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1893426A (zh) * 2005-07-08 2007-01-10 中国电信股份有限公司 实现私网视讯终端穿越防火墙的方法和系统
CN101009740A (zh) * 2007-01-17 2007-08-01 广州市高科通信技术股份有限公司 双pppoe实现数据与语音同时接入的系统及方法
US20120317637A1 (en) * 2011-06-08 2012-12-13 Zhe Huang Communication between private network and public network
CN103166864A (zh) * 2013-03-26 2013-06-19 杭州华三通信技术有限公司 一种私网vlan信息管理方法和设备

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN116250287A (zh) * 2020-07-31 2023-06-09 Oppo广东移动通信有限公司 设备接入认证的方法、终端设备和云平台
CN113676996A (zh) * 2021-08-11 2021-11-19 成都中科微信息技术研究院有限公司 一种基于dvb和5g融合组网的卫星终端注册方法、系统及终端
CN114268949A (zh) * 2021-11-16 2022-04-01 浙江大学 一种5g局域网的网络搭建方法
WO2023138304A1 (zh) * 2022-01-24 2023-07-27 华为技术有限公司 获取签约信息的方法和装置

Also Published As

Publication number Publication date
CN112655182A (zh) 2021-04-13
CN112655182B (zh) 2023-09-15

Similar Documents

Publication Publication Date Title
WO2020087327A1 (zh) 通信方法和设备
US20220330361A1 (en) Method for establishing connection and obtaining relay service code and communications apparatus
US11665542B2 (en) Method and device for network slice authentication
TW202008841A (zh) 會話管理方法、終端設備和網路設備
CN112673687B (zh) 注册的方法、终端设备和网络设备
WO2021030965A1 (zh) 一种中继选择方法及装置、终端设备
US11877326B2 (en) Wireless communication method and communication device
US20220124500A1 (en) Communication method, terminal device and network device
EP3820202B1 (en) Communication method and terminal device
WO2021056576A1 (zh) 一种业务传输方法及装置、通信设备
CN112655244B (zh) 一种业务处理方法、设备及存储介质
JP2022515590A (ja) ネットワークアクセス方法及びデバイス
WO2021088007A1 (zh) 无线通信的方法、终端设备和网络设备
CN111757551B (zh) 一种车联网中的通信方法及终端设备、网络设备
WO2021022428A1 (zh) 无线通信的方法、终端设备和网络设备
WO2019233396A1 (zh) 一种终端能力信息的交互方法、终端设备及网络设备
US11265922B2 (en) Method for accessing wireless local area network, terminal device, and network device
WO2018195971A1 (zh) 获取上下文配置信息的方法、终端设备和接入网设备
WO2020087546A1 (zh) 一种网络信息传输方法、获取方法、网络设备及终端设备
WO2020042038A1 (zh) 通信方法和设备
WO2020097809A1 (zh) 压缩、解压缩以太帧的方法和通信设备
CN116349326A (zh) 无线通信方法、设备及存储介质
CN114557045A (zh) 通信方法及相关装置

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 18938449

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 18938449

Country of ref document: EP

Kind code of ref document: A1